CN109844728A - Arranging system based on user information migrated users data and service - Google Patents

Arranging system based on user information migrated users data and service Download PDF

Info

Publication number
CN109844728A
CN109844728A CN201780062108.5A CN201780062108A CN109844728A CN 109844728 A CN109844728 A CN 109844728A CN 201780062108 A CN201780062108 A CN 201780062108A CN 109844728 A CN109844728 A CN 109844728A
Authority
CN
China
Prior art keywords
user
data
node
mist
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780062108.5A
Other languages
Chinese (zh)
Other versions
CN109844728B (en
Inventor
查尔斯·卡尔文·拜尔斯
贡萨洛·萨尔盖罗
约瑟夫·迈克尔·克拉克
奇丹巴拉姆·阿鲁纳恰拉姆
纳根德拉·库马·奈纳
亚伯拉罕·坡布科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Cisco Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
Publication of CN109844728A publication Critical patent/CN109844728A/en
Application granted granted Critical
Publication of CN109844728B publication Critical patent/CN109844728B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/82Miscellaneous aspects
    • H04L47/823Prediction of resource usage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/119Details of migration of file systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/83Admission control; Resource allocation based on usage prediction

Abstract

For system, method and the computer-readable medium of layout to be carried out to the access of data to data center resource and user.In some instances, a kind of system can determine the data that user will need to store at the access first position of the second position in the second time in first time.The system can identify being capable of storing data and the node that can be accessed by equipment from the second position.The system can also determine first service parameter associated with the network connection between equipment and first position, second service parameter associated with the network connection between equipment and node.When second service parameter has than first service parameter higher quality, which can move to node from first position for data, and equipment is allowed to access data from the second position by node.

Description

Arranging system based on user information migrated users data and service
Technical field
This technology is related to cloud and data center's layout (orchestration) system, more particularly relates to based on use Family information and context intelligently migrate network data between geographic area and network layer and the data center of network access point compiles Heat-extraction system and predictive scheduling and positioning system integrate.
Background technique
Due to globalization, travelling and mobilization have become very common business component.Employee in company labour must It must be for commercial object continually shift position.Meanwhile employee generally requires network data that is reliable and rapidly accessing them To complete their task and commercial object.The multiple positions of large-scale global organization usually in the world have in data The heart and network access point.User on road generally can choose by being geographically connected to group close to their access point The network knitted.But the position of user data will be constant: user data by still trustship user home site.Unfortunate It is that remote data access will increase significant delay and delay, so as to cause loss in productivity.
Sometimes, user may be coupled to the remote computing resource close to user data (for example, local unix host or long-range Desktop client end).But this method needs longer two-way time, this will also generate significant delay.In addition, access Data on remote server also need additionally to share network capacity, and have additional security risk.Therefore, for long-range The Current protocols of data access have significant performance, safety and cost limitation.
Detailed description of the invention
In order to describe the available disclosure above and other advantages and features mode, will be shown by reference attached drawing Specific embodiment is presented being discussed in greater detail to principle described briefly above.It should be understood that these attached drawings are only described The exemplary embodiment of the disclosure, therefore should not be considered as the limitation to the scope of the present disclosure.More by using attached drawing Principle that is detailed and being specifically described and illustrate this paper, in which:
Figure 1A shows example cloud computing framework;
Figure 1B shows example mist computing architecture;
Fig. 2 shows the schematic diagrames of example network framework;
Fig. 3 A show for based on user's context and information in different time the migrating data between system or position Example arranging system schematic diagram;
Fig. 3 B to 3E shows the mobile cloud system of example geo location aware;
Fig. 4 shows exemplary method;
Fig. 5 shows example network device according to various embodiments;And
Fig. 6 A and Fig. 6 B show exemplary system embodiment.
Specific embodiment
The various embodiments of the disclosure are discussed further below.When discussing specific embodiment, it should be understood that in this way It does merely for illustrative purpose.One skilled in the relevant art will recognize that in the condition without departing from spirit and scope of the present disclosure Under, other assemblies and configuration can be used.
It summarizes
Independent claims give many aspects of the invention, and dependent claims give preferred feature.One side The feature in face can be applied to each aspect with being combined individually or with other aspects.
Following description will provide the supplementary features and advantage of the disclosure, these supplementary features and advantage can pass through implementation Principle acquistion disclosed herein will be apparent partly according to this description.By being particularly pointed out in appended claims Combination and equipment, may be implemented and obtain the feature and advantage of the disclosure.These and other features of the disclosure will be from following Description and appended claims become to be more completely clear, or can pass through and implement principle acquistion given herein.
As previously mentioned, remote data access can add significant delay and delay, to will lead to higher cost And loss in productivity.In addition, remote data access needs additional Internet resources or capacity and will cause additional safety wind Danger.Method given herein can be by that will dispatch the stroke or it is expected that (anticipate) cloud or net of cloud or networking client The system integration of the movement of network client into data center's layout, to provide always to the user being traveling at for data and The local IP access of other Internet resources, to eliminate or reduce these problems.
Method given herein may provide for such as application, VM, container data and service and data itself etc Data center resource geographical location optimization access.Can integrate various systems so that the mobile seamless connection of resource and It is consistent with the light load time of the downtime (down time) of user or network.For example, can be by the transmission and intelligence of connection Communication tool system and arranging system are integrated, to provide the local IP access for data (even if on the way).This can be by disappearing Except access resource improves productivity with delay when servicing.Which (a little) mist node is methods herein can identify and be in expectation In the service range of user location, and the user be would be possible into the context needed before each user reaches and preloaded Onto (one or more) the mist node identified.Various strategies herein may provide for the support of machine learning, with Optimize data duplication.In addition, methods herein can support the high velocity environment with frequent switching, for example, high-speed railway, superelevation Iron, UAV network and the LEO satellite constellation with large-scale ground station network.In IoT network, some such data can be with In real time critical control system, within the system, local data access is extremely important for meeting the delay target of system.
Disclose for based on user prediction context and geographical location come marshal data center resources and manage user To the system, method and computer readable storage medium of the access of data.In some instances, system can determine that user will The data of trustship at the homing position from remote location access on network are needed in future time.System can then be identified and be stayed One or more network nodes in geographic area and/or near remote location in region (proximity) are stayed in, and will At least part of the data of trustship moves to the one or more network node at homing position.The system may also help in User is from remote location access data.
Description
Disclosed technology solves in the art for reducing delay associated with remote data access, prolonging When and security risk mechanism demand.This technology is related to for efficiently and effectively layout Internet resources and data access, It can to provide the local IP access of system, method and computer to(for) data and Internet resources always to the user being traveling at Read medium.
It is disclosed first herein to such as Figure 1A, Figure 1B and the network shown in Fig. 2 for accessing and servicing for network data The description of environment and framework.The mechanism as shown in Fig. 3 to Fig. 4 for the access of layout network data is discussed below.This is begged for By then being terminated with the brief description to the example apparatus as shown in Fig. 5 and Fig. 6 A-B.Various implementations should be described herein These deformations that example can provide.The disclosure is turning now to Figure 1A.
Figure 1A shows the schematic diagram of example cloud computing framework 100.The framework may include cloud 102.Cloud 102 may include One or more private clounds, public cloud, and/or mixed cloud.In addition, cloud 102 may include cloud element 104-114.Cloud element 104-114 may include for example, server 104, virtual machine (VM) 106, one or more software platforms 108, application or service 110, software container 112 and infrastructure node 114.Infrastructure node 114 may include various types of nodes, example Such as, calculate node, memory node, network node, management system etc..
Cloud 102 can provide various cloud computing services via cloud element 104-114, for example, software services (SaaS) (example Such as, collaboration services, E-mail service, Enterprise Resources Plan service, content service, communication service etc.), infrastructure i.e. service (IaaS) (for example, secure network, the Internet services, system administration services etc.), platform i.e. service (PaaS) (for example, web services, Streaming service, application and development service etc.) and it is other kinds of service (for example, desktop i.e. service (DaaS), information technology Management i.e. service (ITaaS), management software service (MSaaS), mobile rear end services (MBaaS) etc..
Client endpoint 116 can be connect with cloud 102, to obtain one or more special services from cloud 102.Client end Point 116 can be via one or more public networks (for example, internet), private network, and/or hybrid network (for example, virtual Private network) it is communicated with element 104-114.Client endpoint 116 may include any equipment with networked capabilities, for example, Laptop computer, tablet computer, server, desktop computer, smart phone, the network equipment are (for example, access point, road By device, interchanger etc.), smart television, intelligent automobile, sensor, GPS device, game system, the wearable object of intelligence (for example, Smartwatch etc.), consumer objects (for example, Internet refrigerator, Intelligent light system etc.), city or transportation system be (for example, flow Control, charging system etc.), Internet of Things (IoT) equipment, camera, the network printer, transportation system is (for example, aircraft, train, motor-driven Vehicle, ship etc.) or any intelligence or connecting object (for example, wired home, intelligent building, intelligence retail, intelligent glasses etc.) Deng.
Figure 1B shows the schematic diagram of example mist computing architecture 150.Mist computing architecture 150 may include cloud layer 154 and mist Layer 156, wherein cloud layer 154 includes cloud 102 and any other cloud system or environment, and mist layer 156 includes mist node 162.Client Endpoint 116 can be communicated with cloud layer 154 and/or mist layer 156.Framework 150 may include cloud layer 154, mist layer 156 and client Hold one or more communication links 152 between endpoint 116.Communication can flow upward to cloud layer 154 and/or flow downwardly into client Hold endpoint 116.
Mist layer 156 or " mist " provide calculating, storage and the network savvy of traditional cloud network, but than traditional cloud network Closer to endpoint.Therefore, cloud 102 can be expanded to the position closer to client endpoint 116 by mist.Mist node 162 can be The physical embodiments of mist network.In addition, mist node 162 can provide local or regional service, and/or provides and arrive client end The connectivity of point 116.Therefore, flow and/or data can be discharged into mist layer 156 (for example, via mist node from cloud 102 162).Therefore, mist layer 156 can provide service and/or connectivity faster to client endpoint 116, have lower delay And other advantages are (for example, it is excellent to have benefited from the safety saved the data in inside (one or more) local or Local Area Network Point).
Mist node 162 may include networked computing device, for example, server, interchanger, router, controller, camera, Access point, gateway etc..In addition, mist node 162 can be deployed in from anywhere in having network connection, for example, factory, electric wire Bar, along rail, in the car, on oil rig, in airport, aboard, at the mall in, within the hospital, In park, in parking lot, it is medium in library.
In some configurations, one or more mist nodes 162 can be deployed in mist example 158,160.Mist example 158, 158 can be local or region cloud or network.For example, mist example 156,158 can be region cloud or data center, local area network, The network etc. of mist node 162.In some configurations, one or more mist nodes 162 can be disposed in a network, for example, conduct Independence or separate nodes.In addition, including for example, in various topologys including star-like, annular, grid or hierarchical arrangement, mist section One or more of point 162 can be interconnected amongst one another via link 164.
In some cases, one or more mist nodes 162 can be mobile mist node.Mobile mist node can be moved to Different geographical location, logical place or networks, and/or mist example, while keeping the connection with cloud layer 154 and/or endpoint 116 Property.For example, specific mist node can be placed on can advance to another geographical position from a geographical location and/or logical place Set and/or the vehicles of logical place (for example, aircraft or train) in.In this example, specific mist node can be located at It is connected to the specific physically and/or logically tie point with cloud 154 while initial position, and destination position can be located at The different physically and/or logically tie points from cloud 154 are switched to while setting.Therefore, specific mist node can be in particular cloud And/or moved in mist example, therefore can different time from different location be endpoint service.
Fig. 2 shows the schematic block diagrams of example network framework 200.In some cases, framework 200 may include in data The heart, which can support and/or trustship cloud 102.In addition, framework 200 includes network structure 212, network structure tool Have the leaf interchanger 204A, 204B being connected in network structure 212,204C ..., the backbone of 204N (be referred to as " 204 ") (spine) interchanger 202A, 202B ..., 202N (be referred to as " 202 ").
Backbone switch 202 can be layer 3 (L3) interchanger in structure 212.But in some cases, backbone is handed over Changing planes 202 can also be with execution level 2 (L2) function.Backbone switch 202 is connected to the leaf interchanger 204 in structure 212.Leaf exchange Machine 204 may include access interface (or non-fiber port) and fiber port.Fiber port can be provided to backbone switch 202 Uplink, while access interface can to equipment, host, endpoint, VM or external network provide to structure 212 connection Property.
Leaf interchanger 204 may reside within the boundary between structure 212 and tenant or client space.In some cases In, leaf interchanger 204 can be frame top formula (" ToR ") interchanger, aggregation switch, row end (end-of-row, EoR) exchange Machine, in the ranks (middle-of-row, MoR) interchanger etc..
Leaf interchanger 204 can be responsible for routing and/or bridging tenant's grouping and application network strategy.In some cases, Leaf interchanger can execute one or more additional functions, for example, realizing mapped cache, when there are miss (miss) in caching When to agent functionality send grouping, encapsulating packets, execution entrance or egress policy etc..
In addition, leaf interchanger 204 may include virtual switch and/or tunnelling function, for example, virtual channel endpoint (VTEP) Function.Therefore, structure 212 can be connected to overlay network (for example, VXLAN network) by leaf interchanger 204.
Network connectivty in structure 212 can flow through leaf interchanger 204.Leaf interchanger 204 can be to server, money Source, endpoint, external network or VM provide the access to structure 212, and leaf interchanger 204 can be connected to each other.Some In situation, endpoint groups (EPG) can be connected to structure 212 and/or any external network by leaf interchanger 204.Each EPG can Via for example, one or more of leaf interchanger 204 is connected to structure 212.
Endpoint 210A-E (being referred to as " 210 ") can be connected to structure 212 via leaf interchanger 204.For example, endpoint 210A and 210B can be directly connected to leaf interchanger 204A, and endpoint 210A and 210B can be connected to structure 212 by leaf interchanger 204A And/or any other leaf interchanger 204.Similarly, endpoint 210E can be directly connected to leaf interchanger 204C, leaf interchanger Endpoint 210E can be connected to structure 212 and/or any other leaf interchanger 204 by 204C.On the other hand, endpoint 210C and 210D can be connected to leaf interchanger 204A and 204B via network 206.In addition, wide area network (WAN) 208 may be coupled to leaf friendship Change planes 204N.
Endpoint 210 may include any communication equipment, for example, computer, server, interchanger etc..In some cases, Endpoint 210 may include server or interchanger configured with virtual channel endpoint functionality, and the server or interchanger will cover Network is connect with structure 212.For example, in some cases, endpoint 210 can be indicated with virtual channel end-point capability and be transported The host (for example, server) of row virtual environment (for example, management program, (one or more) virtual machine, container etc.).With endpoint 210 associated overlay networks can be with trustship physical equipment, for example, server;Using;EPG;Virtual segmentation;Virtual work is negative Lotus;Deng.Equally, endpoint 210 can be with trustship virtual work load and application, these workloads and application can be with structures 212 or any other equipment or network (including external network) connection.
Example network environment and structure has been disclosed, the disclosure is visited turning now to according to the network data of various methods The general introduction for the layout asked.
Generally, when user advances to another website from a website, can carry out to a certain degree plan (even if this The plan of sample is at the last moment).For example, some form of transport can be subscribed, hotel can be carried out and made a reservation for, supper can be carried out It arranges, meeting can be arranged, preparation process can be executed, navigation software can be entered a destination into using medium.If will The system integration for predetermined stroke can then make data center perception specific user when will into data center's arranging system Traveling and user will go to where.User can be tied to the data and other resources that user generally uses by arranging system (for example, application).When (that is, when user is physically moved to another position from a position) user's traveling, layout system Data can be reoriented to the remote site closest to the destination of user (for example, Cloud Server, mist from its current site by system Node, LAN server etc.), wherein the current site can be " home base station " for example on geographical location close to user Website.Therefore, when user reaches, user can access phase from the data center for more closely snapping to user current location Same data and resource.This can improve performance, efficiency, safety, cost etc..
Therefore, it is possible to use stroke planning data carrys out the movement of anticipating user and helps to mitigate network (for example, cloud-cloud Network) on load.Can also use there are system confirmation users to arrive at the destination, and signal system and make new position It comes into force.In some instances, data can be organized in container, which can be moved to destination node and just When user reaches, starting (spin up) is got up.
In some cases, not necessarily mobile data.For example, can be with replicate data, and then change can be collected multiple " home base station " position is made go back to update original copy (master copy).In the case where application or VM (virtual machine), it can will provide Subject string links up and moves them into the calculate node closer to the new position of user.Depending on data center architecture, one In a little configurations, identical address access VM or application can be used, this makes processing transparent for terminal user.
When user is scheduled proceeds back to " home base station " position, arranging system data relocation can be gone back or Simply destroy interim scapegoat or copy.When user advances more and more with the time, which can be from traveling mould Formula study, and teledata copy is maintained in particular station.For example, if user regularly New York and San Jose it Between advance, then the snapshot of data copy and VM can be maintained in two websites, only come copies back change collection.When user is more When being moved between a position, master data set can be changed into and be directed toward the position that user is currently located.Advance return when, can be with Mobile owner pointer.Final result is the optimization access for generic resource.
As indicated above, system and stroke planning system can will be present and determine related data is hosted in where Data center's arranging system integrates.In addition, it is not necessary that simply paying close attention to end-to-end position.Size depending on data set The time spent with user in specific position, data duplication/movement can carry out in middle position.For example, if user will be It advances between New York and Bangalore, then the user may have stopping over for extension in London.During in London, data It may reside within European data center, for quickly being had secure access to from airport.When user continues to go to the trip of Bangalore Row, then can again repeat or mobile data.
Other than stroke intended application, a lot of other mechanism can be used to predict when specific user will be in specific mist In the opereating specification of node or cloud node.For example, can be with the social media of counsel user, to check whether to mention any stroke It is single.The reservation systems such as course line, railway, taxi, restaurant, hotel, which can be generated, is pre-charged with request, it might even be possible to by they with Such as the specific address of mobile mist node or neighbouring enterprise's mist node on the vehicles of seating is associated by user.If User advances just on line style route (for example, on interstate highway, railway line, river etc.), then the system can perceive landform, Topology, speed etc., and can predict the expected approach time at mist node along route.Navigation system (for example, with The smart phone at family or they take the vehicles in) can also with the system integration, with obtain user input any mesh Ground and navigation and position data.
The transportation system of connection and intelligent transportation tool can also be implemented to obtain the traveling of user and scheduling data. A this example mobile including superelevation iron and pole dynamic data is described below.Another showing with the movement of more static datas Example can be about air travel.When passenger's registration, the application on phone can detecte registering events, and data can Be copied to people by multiply go by air or airport on storage inside facility.When aircraft front door wait when (for example, plus Oil, loading etc.), data can be sent to aircraft via high speed connection.It by cipher mode storing data and can be put It sets in the addressable logic container of user.Aircraft subsequently becomes the mist extension of cloud (it can be public or privately owned).When User's aboard and when being scanned into, information can be sent to aircraft and cloud service, so that data pointer is during flight It is solidified.If user could not aboard, aircraft can destroy the local replica of data.When user will visit on the way in flight When asking data, user can be pellucidly redirected to local data by cloud service.This can significantly affect productivity.
Thinner granularity can also be even used in the very high performance system with large data sets.Consider to take high Fast train or superelevation iron carry out the user of travel abroad (24 users are advanced in pipeline (pipe) with the rate of 1000Kph). WiFi or optical transceiver in pipe (tube) keep the vehicles to support net connection with ground always.Pipe it is every 2km has a mist node to manage the segmentation of pipe, and access point is driven to service the track 1Km in each direction.AP (access Point) and mist node between switching can carry out within every 7 seconds in the case where these speed it is primary.In order to keep continuously being connected to Property, continuous service is provided for all vehicle functioies and spreads UHD entertainment from cloud and is defeated by each passenger, can be with Be pre-charged with such data to all mist nodes along travelling route: the vehicles are it is anticipated that itself arrived is somebody's turn to do once reaching The data of node itself and passenger's needs.If the superelevation iron vehicles are in the range of given mist node only such as 7 seconds, It can be then wasted due to combinatorial delays more than user-cloud data transmission window mouth of half.On the contrary, if we know that user what When will in the range in given mist node (even if prior notice only 10 seconds), then we can be pre-configured with it may be desired to Each information, and entire 7 seconds windows when user is in the range can be used in internet communication.
Similar concept can be applied to the LEO constellation for being designed to the satellite of low transmission delay operation.It depends on The specific design and number of earth station, each satellite may undergo primary switching per minute, and in next estimated earth The place of station, which is pre-charged with data source, can be improved network throughput.
The delay of cloud can be substantially reduced by being pre-charged with data in local mist node.It is serious that certain applications can be delay 's.For example, networking tactile (wherein, user has the touch feedback from network-based application) can have urgent delay It is required that.If this apply in cloud, round trip delay time may be hundreds of milliseconds in some cases, but the illusion touched is usual 1 millisecond of delay can be exceeded to destroy.Mist technology is remarkably contributing to this scene.Similarly, outer in Telemedicine or remotely In section's application, driving the anatomical data collection of haptic interface can be in size number terabyte, and in patient and sound institute Mist node on be pre-charged with them and will save the quality time.
In addition, the future user locations as described herein based on countless data sources can be by cognitive system with the time Past " acquistion ", so that intelligence and the correlation of active, prediction etc. can be performed, to improve accuracy and automatically in advance Fill data source.For example, if the user being traveling at is in their streamed video during the journey, the corpus of various data sources Library (for example, aircraft, train, automobile, cartographic information, the geographical location GPS/, NETFLIX user's program preferences etc.) can be recognized System processing, to learn user's traveling habit and viewing preference, to provide optimal user experience during their journey It (spreads defeated PoP (point-of-presence, there are points) that is, selection is immediate, spread most preferably cutting between defeated PoP It changes).
Geographical location information can in some instances, for ICN (networking centered on information) and CNN (with Networking centered on content) the mobile cloud of geographical location perception in environment and the content caching of event triggering.In some examples In, the mobile cloud of geographical location perception and the content caching of event triggering may include various assemblies, these components include being based on The data mobility of trigger based on the position intelligent subscriber is used for the ambulant intelligent priority ranking of data, is used for data Ambulant context-sensitive intelligence mark etc..
Each of these components part may be implemented as intelligently obtaining customer position information and utilize location aware Property come the strategically mobile user data in a manner of providing seamless end-user experience, especially for low delay and in real time Using.Here is the general description of each of various assemblies part.
Data mobility based on the trigger based on the position intelligent subscriber
Centralized intelligence system can monitor the geographical location of user (for example, the GPS location of automobile, user's mobile phone Position etc.), and data are moved/copied to immediate content supplier or buffer memory device by Indicated Cloud.Intelligence system The position of user can be used to determine to upload where data movement (to most suitable server, usually most connects in system The server of nearly user).
Various optimizations can be realized for user data priority ranking, current, the Future Positions prediction of automated location etc..Separately Outside, by using user location (current and/or following), which can postpone by reducing and improve overall user body Test the user experience to significantly improve user in access media content.User can download and upload in both direction faster Ground accesses data.
Predictive analysis can be used to determine that data user in where and will may need in the system.Example Such as, if user is frequent traveller and has got new content recently, which can be actively mobile by new content To desired locations.If user's specialized work can be preferably chosen related to the project in some emergent project, the system The data of connection are for being pre-charged with, and old archive project can not be sent.Due to be data by before being actually needed this What sample was done, it is possible to be carried out with lower bandwidth and/or cost.
If there is the content for being frequently visited by the user (or frequently accessing while advancing), then whenever user reaches newly The content can be moved actively when position.
These concepts may be implemented in various contexts, for example, general brain scans may include thousands of files, And size can be gigabytes.Therefore, brain scans can take a long time to obtain or download.Imagine high quality Cat scan is stored in the cloud and downloads them when needed come the surgeon that is watched.When doctor goes to without good When the position of good cloud covering, it may be very time-consuming for obtaining these images.But the system here will recognize use Family is traveling at, and related scans can be actively moved to the more appropriate position of opposite physicians location.Doctor then may be used With these scannings of less delay access.
As another example, media asset is stored in the cloud and needs from any current location all very simply by the imagination Get the travelling correspondent or film maker of these media assets.Here the system can be reduced significantly from different positions The delay that the reporter or film maker set is experienced.By the position of estimated reporter or film maker, which can be with Potential broad medium file is pre-charged on the server that can quickly access, even if the network bandwidth at remote location can It can be very low.
When data flow is received and forwarded by node, system can be data cached.In addition, various touchings can be used in system Device is sent out to execute location-based data buffer storage.Trigger can be manual and/or automatic.Location-based data buffer storage and The non-limiting example of trigger includes:
User hand trend cloud system designated position details is (for example, via for the button in the map application uploaded of travelling Deng).
The stroke schedule regeneration of policy-driven, for example, user configuration is only being traveled beyond apart from 100 miles of home position When the mobile strategy of trigger data.
The dynamic such as personal scheduler of routing, stroke reservation system, the schedule of user, user based on user obtains The position data taken.
Geographical location trigger, for example, GPS, 3G/4G/5G/LTE, user roam into another carrier network etc..
Cognitive system (for example, the traveling mode learnt).
Content can also be denoted as " moving " content by user, this can trigger the location-based caching to the content. For example, the system can track user, and attempt to make content be followed by user when user moves back and forth.
, can be by user data cache in one or more content transponders based on above example, this can improve simultaneously Help access of the user to data.
For the ambulant intelligent priority ranking of data
Another component may include for the ambulant intelligent priority ranking of data.This component is provided to being determined (or prediction) is for specific user or groups of users or classification and by movement (for example, such as in above data mobility assembly It is described) user data assign priority ability.To the non-limiting example of the intelligent priority ranking of user data Include:
User be manually specific data or certain types of data/application configuration assign priority (for example, profile, Using etc. in).
Based on including frequency of use, use etc. recently including various algorithms the automatic of policy-driven is carried out to user data Priority ranking.
Priority label is carried out to data based on the intelligence mark for being marked as mobile data.
Priority label is carried out to user data based on using to analyze.
The priority to user data based on cloud provider subscription level (for example, platinum grade, gold grade etc.) marks.
Based on the data priority by the analysis of study/cognitive system.This includes analyzing from pervious similar trip Data access history.
For example, in one example, the user most possibly needs when system can determine on the road for specific user Want what kind of data (for example, new data, big data, the data frequently accessed etc.).System can be based on various factors Practise or find (for example, by using cognitive system) data use pattern, these factors are for example, starting point/destination geography Position, trip type (for example, work or leisure), history of similar trip etc..
It can be according to single user and/or multiple users come affirmation mode.For example, system may learn when people travel round Universal time, there are people to need a plurality of types of data of high speed access according to their destination: advancing to the use in the Antarctic Continent Family is wanted to take home photos, and the user for advancing to Europe wants to take ENGINEERING CAD file.
For the ambulant context-sensitive intelligence mark of data
Another component may include for the ambulant context-sensitive intelligence mark of data.Can according to number of users Data are indicated according to mobility correlation or influence user data ambulant mode.For example, user can use instruction Whether some data should be carried out to indicate manually by mobile display label the data of user.In addition, user can be based on various shiftings Dynamic property-influence criterion is come using the more complicated manual mark to data, for example, being that work is relevant or personal by content-label (for example, leisure/interest/vacation).As needed, the granularity of mark can be flexible and be that embodiment is specific.
Mark can be manually, automatically, and/or even predictive.Some non-limiting examples may include:
User indicates manually.
User data is indicated automatically based on function (for example, work, individual etc.).
Based on carrying out the automatic user data that indicates using profile or analysis.
For the ambulant specific mark of application of data.
Based on the automatic mark of the cognition to past mark/learning system analysis.
For example, specific audio books supplier can be used in user, and have from technology books to interesting summer time Read the various reading inventories in scope of listings.Based on context it is differently indicated in these audio books in some way (for example, a book may have " movement-work " label, another writing materials have " movement-vacation " to the ability of every kind of audio books Label) determining user will be in the summer during 22 days vacations with being based further on component intelligence discussed above for the system of can permit The movement of the prestige name for ancient tribes in the east and data to immediate storage/buffer should be assigned with relevant " movement-vacation " label label Data priority.
The disclosure is shown turning now to Fig. 3 A, Fig. 3 A for being based on user's context and information in different time in system Or between position the example arranging system 300 of migrating data schematic diagram.User 310 can access user from homing position 302A Data 312.Homing position 302A can be such position: user generally access the position of data 312, be specified in its into Position that the position of row work, user 310 are resided in etc. (for example, geographical location or region, for example, country, city, state or Continent;Building, for example, office building;Access point, for example, mist node, network or gateway;Address;Vehicles etc.).In order to clear Chu and explanation, provide non-limiting example.In fact, position 304 can be user 310 accessed, accessing and/ Or the data 312 that use of expectation from any other position.
Data 312 can be hosted in cloud layer 154.Therefore, user 310 can be by cloud layer 154 and user in ownership position Link A (314) between the calculating equipment at 302A is set from the data 312 on homing position 302A access cloud layer 154.Calculating is set It is standby to can be any calculating and/or connection equipment (for example, client endpoint 116) with network capabilities.
User 310 can access data 312 from homing position 302A in the time 1 (306).However, it is possible to make user 310 Remote location 302B will be advanced in the time 2 (308) and may need or attempt in the time 2 (308) from remote location 302B Access the judgement of data 312.In response, can make user can be in number from access of the remote location 302B to data 312 Remote node 162 is migrated to according to 312 (or a part of data 312) to allow user 310 by remote node 162 from remote The judgement being enhanced in the case where journey position 302B access data 312.
For example, it is possible to make user from remote location 302B to the quality and/or characteristic of the access of data 312 (for example, property Energy, safety, cost, bandwidth, delay, burden, resource requirement, stability or reliability etc.) user 310 pass through cloud layer 154 Or pass through (one or more) different node, (one or more) network, (one or more) cloud, (one or more) Whether mist, position etc. preferably determine in the case where accessing data 312 from remote location 302B.If being made that user from long-range Position 302B to the quality and/or characteristic of the access of data 312 can by allowing user 310 by remote node 162 rather than Cloud layer 154 accesses data 312 come improved judgement, then data 312 and/or part of it can be moved to remote node 162.
Remote node 162 can be selected from one or more remote nodes, network, position etc..For example, can be based on remote The geographic area of journey position 302B or any other node near zone or network select remote node 162.It can be with Proximity on logic-based selects remote node 162, that is, in the case where not considering physical geographic location most efficiently Or the network site of peak performance.In addition, in some cases, remote node 162 may include from identical network or layer (example Such as, cloud layer 154, mist layer 156, identical network etc.) or multiple nodes from heterogeneous networks or layer.For example, in some cases, Remote node 162 may include across heterogeneous networks or layer or the multiple nodes being distributed across identical network or layer.Herein, in order to Clear and succinct, remote node 162 is referred to as the individual node as non-limiting example.
In order to determine user from remote location 302B access data 312 (one or more) quality and/or characteristic be Data 312 are via cloud by the case where storage and access or the feelings that are stored and accessed via remote node 162 in data 312 Under condition, (one or more) quality and/or characteristic of link B and C (316,318) can be compared.Link B (316) can be from Connection or link of the remote location 302B to cloud layer 154, and link C (318) can be from remote location 302B to long-range section The connection of point 162 or link, wherein user alternatively can access data 312 from remote location 302B.
Therefore, the relative users access parameter that can be confirmed and compare or analyze link B and C (316,318), is used with determining Family 310 should access data 312 by cloud layer 154 or remote node 162.It may include the following terms that user, which accesses parameter, Parameter: performance quality (for example, delay, handling capacity or bandwidth, availability, uptime etc.), safe mass (for example, plus Close, security risk or potential fragility, public's accessibility etc.), cost (for example, routing or switching cost, cost of serving etc.), Geographical location is (for example, to the distance of remote location 302B, homing position 302A, and/or cloud layer 154;Such as country, continent, city The geographical location in city, cities and towns or the like;Accessibility;Deng) etc..
When customer parameter instruction remote node 162 will improve performance quality (for example, more low delay, higher throughput or band Wide, more multi-availability or uptime etc.), improve safe mass (for example, preferably encryption, lower security risk or Fragility less accesses public or unauthorized user, bigger security control or strategy, bigger protection etc.), reduce cost (for example, reduce routing or switching cost, reduce service charge or cost of serving, reduce the cost that resource or resource use etc.), To better geographical location (for example, apart from upper closer or more neighbouring, more preferable or more resource of number etc.), reduce resource requirement Or whens consumption etc., remote node 162 can be selected to be used to count as when user 310 is in remote location on cloud layer 154 According to 312 access point and/or storage point.
Once selecting and/or identifying remote node 162, so that it may move to a part of data 312 or data 312 Remote node 162 or network associated with remote node 162 (for example, mist 158, mist 160, mist layer 156, region cloud etc.).? In some configurations, data 312 can be dispatched for moving to remote node 162 before the time 2 (308).But in some feelings In condition, data 312 can be moved into remote node when user 310 advances to remote location 302B from homing position 302A 162, so that data start and at time 2 (308) at homing position 302A in remote node at time 1 (306) Terminate at 162.It can choose the pre-set time amount that the selected data before T2 (308) moves to mist layer 156 from cloud layer 154, with Adapt to the expection rate of transform on cloud to mist link 320.Therefore, in time T3 304, user data 312 will start from cloud layer 154 To the transmission of mist layer 156.
In some cases, data 312 can be moved to along from homing position 302A to the road of remote location 302B Other nodes or access point (for example, network, gateway, server etc.) of diameter.For example, if user is just from New York to Turkey's row It stops over into and London, then data 312 can be moved to before data 312 are moved to Turkey and be stopped in user It stays in during London by the node of selection hosted data 312.Based on from London to the node link or connection it is associated Data access parameters select the node.For example, can be to data 312 in London or the node due to the node Smaller delay (when accessing the data from London) is provided and selects the node.Then, Turkey is reached from London in user 310 Before, data 312 can be moved to the remote node positioned at Turkey.
Fig. 3 B to 3E shows the example of the mobile cloud of geographical location perception.It is turning initially to Fig. 3 B, user 322 starts from him The North Carolina state Raleigh city homing position 324 to Niagara Falls selected destination 320 summer highway Trip.
When going on a journey beginning, user 322 can search the direction for going to stroke destination, and can be to content supplier Travel map is shared by 334 (for example, providers of cloud 102).Content supplier 334 can determine the content points along travel path 326-332, these content points can be buffer and/or data center, for example, cloud or mist.Content supplier 334 can also be really Determine the traveling mode of user 322, and estimates the substantially arrival time in intermediate geographical location.
If the subscriber carried out personal trip, content supplier 334 in the essentially identical time in the several years in past It can intelligently and automatically determine that the trip is leisure or vacation trip.Content supplier 334 can be interested to user 322 Data set assigns priority, wherein the interested data set of user 322 is the new film for example, the favorite video presentations of user Section, the most frequent audio frequency song listened to, the e-book currently read, user reading inventory newest nationality etc. of not reading.It takes The certainly Estimated Time of Arrival at each intermediate geographical location (for example, point 328-332), the interested data set of user can be by It is scheduling in trust or is buffered at the point 326-332 along travel path.
When user 322 is in the homing position 324 in Raleigh city, user 322 can access from the content points 326 in Raleigh city Content.Content points 326 can provide the maximum in terms of cost and performance to user 322 when user is in homing position 324 Benefit.Content when user 322 advances, at the accessible each content points 328-332 along path of user 322.
With reference to Fig. 3 C, when user 322 advances, media client used in user 322 is (for example, web browser or matchmaker Body player) it can be to the current geographic position of the update user of content supplier 334.Content supplier 334 can be used currently Position determines when media client to be redirected to content points 344 from content points 326.Identical concept also can be extended It is uploaded to media, for example, uploading real-time video from the external camera of the vehicles to immediate video cloud.This facilitate to In the faster upload of the data (for example, for insure, the forensics analysis of legal, police's purpose traffic accident) of analysis and more fast The availability of speed.
Current location information also allow content supplier 334 can determine travel path change and mark data by Trustship is for the new medium content point that faster accesses.For example, content supplier 334 identifies Fu Jini in advance with reference to Fig. 3 B Content points 328 at the city of the Norfolk Ya Zhou, as one in the potential host of the content-data along the path.But it is interior Different content points can be selected based on change condition or situation by holding provider 334.For example, referring back to Fig. 3 C, content is mentioned State of West Virginia Charleston city can be selected based on the current location 340 of user and any change condition for quotient 334 The content points 344 at place.
Current location information additionally aids when decision clears up after user 322 has passed through the middle position in travel path Content caching.
Content supplier 334 can determine that the current location 340 of user is state of West Virginia Bake interests.Work as user 322 in state of West Virginia Bake interests, and next content points 344 can be identified as Xi Fujini by content supplier 334 Content points 344 in the city of the Charleston Ya Zhou, rather than the content points 328 in Norfolk Virginia city.As previously mentioned, can To select content points 344 based on the current location 340 of (and being not limited to) user 322.Therefore, content points 344 can be user 322 be in the state of West Virginia Bake interests when user 322 nearest data center.The system is in the route or peace in face of variation It is adjusted in the case where row, it is contemplated that the preparatory caching of selected data.
Content supplier 334 can redirect client with the content points 344 from the Charleston city of the state of West Virginia Access (that is, download/upload) further data.If user 322 selects to check the segment of the performance X in this week, user 322 It can be from 344 streaming content of content points.Content supplier 344 should make content points 344 of the content in the city of Charleston Place is available.Content then can be streamed to client from content points 344 at faster speed.User 322 can not have Performance is enjoyed under conditions of any network interruption (for example, downloading delay, intermediate suspension, buffering etc.).
With reference to Fig. 3 D, user 322 can continue on path traveling.Content supplier 334 can determine user's 322 Current location 360 is city, Pittsburgh, Pennsylvania.When user 322 enters Pennsyivania, content supplier 334 can It is located at next nearest content in the western Fabia state city, Pittsburgh of guest with the mark of current location 360 based on (but being not limited to) user Point 330.Content supplier 334 can then redirect client with from the content points 330 in the western Fabia state city, Pittsburgh of guest Access (that is, download/upload) further content.
For example, it is assumed that user 322 accesses an e-book " Tourist Points in Buffalo bought recently (tourist spot of Buffalo) " is to start the activity during arrangement rests on stroke destination.Content supplier 334 is upper and lower The e-book is denoted as " movement-vacation " data set in text and the electronic copies of the e-book are moved to Pittsburgh The content points 330 in city.This enables quick-downloading e-book while on the way traveling of user 322.
With reference to Fig. 3 E, when content supplier 334 determines that the current location 380 of user 322 is the New York city Ai Mosite, Content supplier 334 can be located at the next of New York Buffalo city based on the mark of current location 380 of (and being not limited to) user A content points 332.Content supplier 334 can redirect client to access from the content points 322 in city, Pittsburgh into one The data of step.It, can be from the content points in Buffalo city when user reaches stroke destination 320-- Big Fall In Niagara 332 download contents and/or upload content to the content points, because the content points are the tools in Big Fall In Niagara of user 322 It is provided with the nearest data cloud of the optimum performance of optimal user experience.In addition, the travelling stage described in fig. 3e, content is provided Quotient 334 can be written to the user data in preceding node (for example, 330) and copy back into ownership cloud 326, then from intermediate node 330 delete all data used associated with the trip.
User 322 can access his/her favorite audio album during Big Fall In Niagara is taken a walk.Content provides The favorite audio frequency song of user will be classified as " mobile-personal " by quotient 334, and the data set is moved to Buffalo city In content points 332.Therefore, the client of user can be downloaded from cloud spreads transfer audio, and postpones in no any downloading In the case where play the song immediately.Similarly, user 322 can be during resting on Big Fall In Niagara immediately from content Point 332 accesses other interested data, for example, favorite video presentations, e-book, home photos.
When forecasting or predicting the content points along travel path, user 322 is can be used in difference in content supplier 334 The current location of period.Content supplier 334 can also calculate or predict that user 322 incites somebody to action in different time when user advances In where.As previously mentioned, content supplier 334 can also be confirmed position data using other information, make content Point prediction, and/or data cached.
For example, user 322 can inwardly hold the stroke list that user shares in provider 334 from travel site or course line website. For example, it is the Africa at 12345 that user 334, which advanced to postcode from USA using course line B July 4,.Based on routing, A few hours before July 4, the individual of user 322 or work-relevant data are buffered in one around the position 12345 in Africa In a or multiple content transponders.If course line B has the arranging of interim hosted data, the number of user during flight duration According to can be buffered in aircraft.When user 322 reaches Africa, data will be used for quickly visiting in nigh caching It asks.
In addition, past traveling event can be used definitely to predict upcoming traveling meter in content supplier 334 It draws.For example, user 322 generally advances to Europe during vacation in December range.
Cognitive system can attend the run-length data of Cisco Live (Cisco scene) or IETF meeting every year based on user Corpus (for example, timetable, stroke list, social media system etc.) learnt, and can determine these at hand Position and the data of user are moved to the position.
Content supplier 334 is also based on the personal use of data or based on the groups of data using determining needs What mobile data.For example, for the next Cisco Live meeting that will be carried out in New Zealand, content supplier 334 can be with Actively or manually by the display data of meeting and necessary data move closer near region.
Some fundamental system components and concept has been disclosed, the disclosure is implemented turning now to instance method shown in Fig. 4 Example.For sake of simplicity, describing the party according to framework 100 and 150 shown in figure 1A and 1B and arranging system shown in Fig. 3 300 Method.The step of summarizing herein is exemplary and can be with any combination of these steps (including exclusion, addition or modification The combination of certain steps) Lai Shixian.
In step 400, this method may include: to determine that user (310) will be in the second time in (306) at the first time (308) it needs to be stored in the data (312) that first position (102) store from the second position (302) access.Data (312) can be with It is serviced including any type of data and/or (one or more), for example, streaming media, file, application content, database Content, storing data etc..In addition, the determination at step 400 place may include that prediction user (310) will be needed from the second position (302) data (312) are accessed.This method factor and/or source can predict the Future Positions of user based on one or more.
The schedule or timetable that factor and/or the non-limiting example in source include user (310) are (for example, the electricity of user Sub- mail or business schedule);The previous traveling mode of user (310) (for example, traveling history of user);It is mentioned from social networks Take data (for example, the state from user (310) or user contact updates, the comment in the social network page of user, User publication comment, the link on social networks associated with user (310) or upload, and/or come from user (310) or Any other activity in the social networks of other users associated with user (310));Network associated with the user is inclined It is good;Current and/or former network associated with user (310) or data use pattern;Communication associated with user (310) (for example, user (310) send or receive Email, user 310 create message, user generate request (for example, from The second position (302) accesses the help desk request of data (312), carries out the long haul communication enabled on the phone of user Request etc.);It is associated with user (310) one or more predetermined or reserved (for example, plane ticket, automobile leasing are predetermined, hotel Reserved, restaurant reserves, meeting room or office are reserved, profession is appointed etc.);Navigation or positioning system are (for example, GPS system, map Or navigation software application, positioning service or application, the positioning of smart phone and movement);And/or instruction user is just or will be to second Any information that position (302) is advanced is (for example, information, the credit card of toll ticket or garage ticket have been bought in instruction Activity (for example, purchase company credit card), instruction are to interested web browser of different location etc.).
In step 402, this method may include: mark can storing data (312) and can by calculating equipment (116) from The network node (162) of the second position (302) access.Network node can be identified based on the following terms: the second position (302) (for example, geographical location of the second position) available any (one or more) network and/or connects at the second position (302) Access point, the second place available link, the available node in the second place and/or link performance or security parameter and/ Or characteristic, near the second position (302) in region and/or can be to equipment offer connect from remote location (302) The performance of threshold levels or the mist of safety and/or cloud node (for example, local or region mist or Yun Jiedian) etc..Near zone can Be physics/or it is geographic or based on network topology in logic near region.
Network node (162) can be selected from the multiple both candidate nodes for hosted data (312) identified.It can be with Based on corresponding proximity or geographical location, connection/service respective performances or quality, corresponding link cost, corresponding Safety condition or ability, corresponding resource capability or requirement etc., select network node from multiple both candidate nodes.
Network node (162) can be mist node (for example, mist layer 156), Yun Jiedian (for example, region cloud), local node (for example, the node in same local network, the node in identical private network, node in same geographic location etc.) etc..One In a little situations, network node (162) can be local mist node or region cloud node.
This method may include: to determine and the between calculating equipment (116) and first position (102) in step 404 One network connection or the associated first service parameter of link (316);And in step 406, determines and calculating equipment (116) The second network connection or the associated second service parameter of link (318) between network node (116).First and second clothes Parameter of being engaged in may include data access performance parameter (for example, shake, delay, bandwidth etc.);Data or network-access security ginseng Number (for example, encryption, security clearance, security strategy, data protection program, safe floor etc.);Cost (for example, service or resource at Sheet, routing cost, is subscribed to cost, resource requirement or is utilized at bandwidth cost);QoS parameter;Plan from specific organization Summary or preference;And/or service or the quality related parameter of any other type.
In step 408, when there is second service parameter service parameter more higher than first service parameter to score, this method It may include: that a part of data (312) is moved into network node from first position (102) before the second time (308) (162).By moving to network node (162) a part of data (312), this method, which can permit, calculates equipment (116) Access the part of data (312) from the second position (302) by network node (162) in the second time (308).
In step 408, a part of data (312) can be moved to network node (162) and network node (162) Associated network, and/or via network node (162) addressable any position.In addition, in order to determine second service parameter It scores with service parameter more higher than first service parameter, the first and second service parameters can be compared which (a little) determined Parameter indicates higher performance rate (for example, compared with low delay, higher bandwidth, lower error, higher uptime or can With property, lower response time, lower hop count etc.), higher service quality rating, higher security level (for example, plus Close, access limitation, safety condition and/or strategy, firewall rule, safe floor, security protocol etc.), lower cost (for example, Lower resource consumption, lower subscription or service rate, lower resource requirement etc.), to the second position (302) and/or excellent Select the closer physically or logically proximity etc. in geographical location.
In some cases, this method can also comprise determining that after (306) at the first time but in the second time (308) the third time before, wherein user (310) will not need access data (312) in the third time;And The migration at step 408 place is executed during three times.The third time can be the downtime of user.For example, the third time can be with It is user by traveling, period for resting, have a meal etc. and data (312) may not being accessed.For example, this method may include: User (310) interphase in third is predicted based on the estimation traveling time between first position (304) and the second position (302) Between will not need access data (312), wherein traveling mode be not easy to network access.It can be estimated based on the following terms to determine Count traveling time: traveling mode (for example, automobile, train, aircraft, helicopter, slide plate etc.), travel distance (for example, 10 miles, 100 miles, 1000 miles etc.), travel speed (for example, average travel speed, current travel speed etc.), one or more estimations When previous traveling between traveling condition (for example, traffic, delay, weather etc.), first position (304) and the second position (302) Between (for example, based on statistics or historical data etc.), stroke segmentation or means of transportation (for example, ride in an automobile, then airplane, Then used during taking train) number, the timetable of announcement etc..
After identifying the third time, this method may include: (one or more that mark moves to data (312) It is a) the second network node, to allow user (310) to access data (312) from (one or more) second network node.It can be with (one or more) second network node is identified based on the following terms: from the position of user (310) during the third time To the quality of the connectivity of (one or more) second network node, during the third time user (310) to (one or more) The accessibility of second network node, during the third time (one or more) second network node to user (310) away from From and/or proximity etc..The quality of connectivity can based in user (310) during the third time from first position (304) user equipment and (one or more) second network node when advancing to the second position (302) from user location Between connection or link one or more parameters or characteristic.The one or more parameter or characteristic can define service performance (for example, delay, handling capacity or bandwidth etc.), safety, reliability etc..
In some cases, this method may include: to determine between first position (304) and the second position (302) Travel path or method;One or more network nodes are identified, for example, in user in first position (304) and the second position (302) by mist node (162) accessible by user when advancing between;And one or more of identified node of selection with For migrating data (312), so that user (310) can access data by these selected one or more nodes (312).Selected one or more nodes can be selected based on performance, distance or proximity, safety, cost etc.. For example, selected one or more node can be user when user (310) advance can access most from the position of user Closely, most fast, most safe, generally the least expensive, and/or peak performance (one or more) node.If the vehicles of user (fly Machine, train, ship, taxi etc.) it include mobile mist node, then data (312) can be migrated on the movement mist node simultaneously And it is taken together with user for best possible connectivity.
The disclosure shows example apparatus turning now to Fig. 5 the and Fig. 6 A-B for showing example apparatus.
Fig. 5 shows the example network device 500 for being adapted for carrying out exchange, port-mark, and/or port authorization operation. The network equipment 500 includes main central processing unit (CPU) 504, interface 502 and bus 510 (for example, pci bus).When When being acted under the control of appropriate software or firmware, CPU 504 is responsible for executing grouping management, error-detecting, and/or routing function Energy.CPU 504 preferably realizes all these function under the control of software and any appropriate application software including operating system Energy.CPU 504 may include one or more processors 508, for example, coming from Intel's x86 microprocessor family, Motorola The processor of microprocessor family or MIPS microprocessor family.In alternative embodiments, processor 508 is for controlling net The specially designed hardware of the operation of network equipment 500.In a particular embodiment, memory 506 (for example, non-volatile ram, TCAM, and/or ROM) also formed CPU 504 a part.But there are many not Tongfangs that memory may be coupled to system Formula.
Interface 502 is generally provided as modular interface card (sometimes referred to as " line card ").Generally, they control data It is grouped in sending and receiving on network, and supports other peripheral equipments being used together with the network equipment 500 sometimes.It can be with The interface of offer is Ethernet interface, Frame Relay Interface, cable interface, DSL interface, token ring interface etc..Furthermore it is possible to provide The interface of various very high speeds, for example, fast token ring interfaces, wireless interface, Ethernet interface, gigabit ethernet interface, Atm interface, hssi interface, pos interface, fddi interface, WIFI interface, 3G/4G/5G cellular interface, CAN BUS, LoRA etc..One As, these interfaces include suitable for the port with appropriate medium communication.In some cases, they can also include independent process Device, and in some instances may include volatibility RAM.Independent processor can control such as packet switch, medium control, The communications-intensive tasks of signal processing, Cipher Processing and management etc.The list of communications-intensive tasks is used for by providing Only processor, these interfaces allow main microprocessor 504 to be effectively carried out router-level topology, network diagnosis, security function etc..
Although system shown in fig. 5 is a particular network device of the invention, it is not that may be implemented on it Only network device architecture of the invention.For example, usually using the single processor with manipulation communication and router-level topology Framework etc..In addition, other kinds of interface and medium can be used for router.
Regardless of the configuration of the network equipment, the program that general-purpose network operations can be used for using storage is configured as It instructs and for roaming described herein, one or more memories of the mechanism of routing optimality and routing function or storage Device module (including memory 506).Program instruction can control the behaviour for example to operating system and/or one or more application Make.One or more memories can be additionally configured to storage such as mobility binding list, registration form and contingency table or the like Table.Memory 506 can also save various application container engines (docker), container and virtual execution environment and data.
The network equipment 500 can also include specific integrated circuit (ASIC) 512, which, which can be configured as, executes routing And/or swap operation.ASIC 512 can be communicated via bus 510 with the other assemblies in the network equipment 500, to exchange data With various types of operations (for example, routing, exchange, and/or data storage operations) of signal and coordination network equipment 500.
Fig. 6 A and Fig. 6 B show exemplary system embodiment.When implementing this technology, being more appropriately carried out example will be for Those of ordinary skill in the art are apparent.Those of ordinary skill in the art also will be readily understood that, other systems embodiment It is also possible.
Fig. 6 A shows system bus computing system framework 600, wherein the component of the system is electric each other using bus 606 Communication.Exemplary system 600 includes processing unit (CPU or processor) 604 and system bus 606, system bus 606 will include Various system components including system storage 620 are (for example, read-only memory (ROM) 618 and random access memory (RAM) 616) it is coupled to processor 610.System 600 may include directly connecting, being in very close to processor 610 with processor 610 Position or be integrated into processor 610 a part high-speed memory caching.System 600 can be by data from storage Device 620 and/or storage equipment 608 copy to caching 602, the quickly access of device 604 for processing.In this way, caching can be provided and be kept away Exempt from the performance boost of delay of the processor 604 in equal pending datas.These and other modules can control or be configured as to control Processor 604 processed executes various movements.Also other systems memory 620 can be used.Memory 620 may include having difference A variety of different types of memories of performance characteristics.Processor 604 may include any general processor and hardware module or soft Part module, for example, be stored in it is in storage equipment 608, be configured as control processor 604 and general processor is (wherein, soft Part instruction is incorporated into actual processor design in) module 1 610, module 2 612 and module 3 614.Processor 604 It substantially can be completely self contained computing system, include multiple cores or processor, bus, Memory Controller, caching etc.. Multi-core processor can be symmetrically or non-symmetrically.
It is interacted in order to enabled with user that is calculating equipment 600, input equipment 622 can indicate any number of input machine Structure, for example, the touch sensitive screen, keyboard, the mouse, movement input, voice that are used for the microphone of voice, are inputted for posture or figure Deng.Output equipment 624 is also possible to one of a variety of output mechanisms well known by persons skilled in the art or a variety of.In some realities In example, multimodal systems can be used family and be capable of providing a plurality of types of inputs to communicate with calculating equipment 600.Communication interface 626 can generally dominate and manage user's input and system output.For the operation in any specific hardware layout, there is no limit, Therefore when developing improved hardware or firmware is arranged, essential characteristic here can be easy to be replaced by these warps Cross improved hardware or firmware arrangement.
Storage equipment 608 is nonvolatile memory and can be hard disk or can store computer-accessible number According to other kinds of computer-readable medium, for example, cassette, flash card, solid-state memory device, digital versatile disc, magnetic Tape drum (cartridge), random access memory (RAM) 616, read-only memory (ROM) 618 or their combination.
System 600 may include integrated circuit 628, for example, being configured as executing the specific integrated circuit of various operations (ASIC).Integrated circuit 628 can be coupled with bus 606, to communicate with the other assemblies in system 600.
Storage equipment 608 may include the software module 610,612,614 for control processor 604.It is also envisioned that Other hardware or software module.Storage equipment 608 may be coupled to system bus 606.On the one hand, the hardware of specific function is executed Module may include the component software of storage in computer-readable medium, which combines necessary hardware component (example Such as, processor 604, bus 606, output equipment 624 etc.) realize the function.
Fig. 6 B shows the example computer system 650 with chipset framework, which can be used for executing Described method, generation simultaneously show graphic user interface (GUI).Computer system 650 can be used to realize disclosed The example of the computer hardware of technology, software and firmware.System 650 may include processor 652, and processor expression can Execute any number of physically and/or logically upper difference of the software for being configured as executing identified calculating, firmware and hardware Resource.Processor 652 can be communicated with chipset 660, and chipset 660 can control to and from the defeated of processor 655 Enter and exports.In this example, chipset 654 is to output end 662 (for example, display) output information, and can read simultaneously Information is written to storage equipment 664, storage equipment 664 may include such as magnetic medium and solid state medium.Chipset 654 can be with Data are read from RAM 666 and data are written to RAM 666.For the bridge 656 with various 658 interfaces of user's interface unit It can be provided for and 654 interface of chipset.This user's interface unit 658 may include keyboard, microphone, touch detection And processing circuit, pointing device (for example, mouse) etc..Generally, in the input of system 650 can come from each provenance, machine generates Appearance, and/or the mankind generate any one in content.
Chipset 654 can also physical interfaces different from can have 660 interface of one or more communication interfaces.These Communication interface may include for wired and wireless local area network, for broadband wireless network and connecing for individual domain network Mouthful.It may include receiving physical interface for generating, showing and using some applications of the method for GUI disclosed herein Ordered data collection or can by by processor 654 analyze be stored in storage equipment 664 or 666 in data come by machine Itself is generated.It inputs and in addition, machine can be received via user's interface unit 658 from user by using processor 652 These inputs are parsed to execute appropriate function (for example, browsing function).
It is to be appreciated that example system 600 and 650 can have more than one processor 604/652, or can be Networking provides the group of the calculating equipment of bigger processing capacity or a part of cluster together.
In short, describe for data center resource and user to the access of data carry out the system of layout, method and Computer-readable medium.In some instances, a kind of system can first time determine user will the second time need from Second position access is stored in the data at first position.The system can identify being capable of storing data and can be by equipment from The node of two positions access.The system can also determine associated with the network connection between equipment and first position first Service parameter and second service parameter associated with the network connection between equipment and node.When second service parameter has When having than first service parameter higher quality, data can be moved to node from first position by system, so that equipment passes through Node accesses data from the second position.
In order to get across, in some instances, this technology be can be presented that including independent functional block comprising include Have a functional block of the following terms: equipment, apparatus assembly, software realization method in step or routine or software and hardware Combination.
In some embodiments, computer readable storage devices, medium and memory may include include bit stream etc. Wired or wireless signal.But when mentioning non-transient computer readable storage medium, clearly excludes such as energy, carries The medium of wave signal, electromagnetic wave and signal itself etc.
Storage can be used in computer-readable medium or can otherwise be obtained from computer-readable medium Computer executable instructions realize according to the method for above-mentioned example.These instructions may include for example, promoting or configuring general Computer, special purpose computer or dedicated treatment facility execute the instruction and data of some function or function group.It can be in network Computer resource part used in upper access.Computer executable instructions can be for example, binary intermediate format instructions (for example, assembler language), firmware or source code.Used instruction, information can be used to store, and/or according to described The example of the computer-readable medium of the information created during exemplary method includes disk or CD, flash memory, with non-volatile USB device, the networked storage devices etc. of property memory.
Realize that according to the equipment of the method for these disclosures may include hardware, firmware, and/or software, and can be with Using any one desktop, laptop in various forms factor.The typical case of these desktop, laptops include laptop computer, Smart phone, small sized personal computer, personal digital assistant, rack-mounted installation equipment, autonomous device etc..Functionality described herein Also it may be implemented in peripheral equipment or package card.These functions also may be implemented for example, executing in one single not With on the circuit board among processing or different chips.
Instruction, for transmit these instruction medium, for execute these instruction computing resource and for supporting this The other structures of a little computing resources are for providing the component of function described in these disclosures.
Although using various examples and other information come explain in scope of the appended claims for the use of, should not Any restrictions that claim is implied based on the special characteristic or arrangement in these examples, because of those of ordinary skill in the art It will enable and derive various embodiments with these examples.Although having used structure feature and/or the example of method and step special The some themes of fixed language description, it is to be understood that theme defined in the appended claims is not necessarily limited to be retouched These features stated or movement.For example, this function can differently be distributed other other than the component identified herein It is performed in component or in these components.On the contrary, open described feature and step, the model as appended claims The example of the component of system and method in enclosing.
One or more members of the claim language instruction set of " at least one " in reference set meet right It is required that.For example, the claim language of reference " at least one of A and B " indicates A, B or A and B.
In addition, as used in this article, " a part " of term article or the "at least a portion" of article indicate entire object Product or less than entire article but be greater than zero arbitrary portion.For example, the claim language of reference " a part of X " indicates X's Entire part or entire part less than X but be greater than zero arbitrary portion.Similarly, it quotes " at least part of X " Claim language indicate X entirety or entirety less than X but be greater than zero X arbitrary portion.

Claims (23)

1. a kind of method, comprising:
The data that user will need to store at the access first position of the second position in the second time are determined in first time;
Network node is identified, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
Determine first service parameter associated with the first network connection between the calculating equipment and the first position;
Determine second service parameter associated with the second network connection between the calculating equipment and the network node; And
When there is the second service parameter service parameter more higher than the first service parameter to score, at described second Between before a part of the data moved into the network node from the first position, and pass through the network node The access from the second position to the part of the data is provided to the calculating equipment.
2. the method as described in claim 1, further includes:
Determine the third time before second time, the user described in the third time will not need to access the number According to;
Wherein, the migration of the part of the data is performed during the third time.
3. method according to claim 2, wherein determine that wherein described user will not need to access described the of the data Three times included: that the prediction user will not need to access the data during the third time, and the prediction is based on institute State the estimation traveling time between first position and the second position.
4. method as claimed in claim 3, wherein the estimation traveling time be based at least one of the following terms come Determining: traveling mode, travel distance, travel speed and one or more estimation traveling conditions.
5. method according to any one of claims 1 to 4, wherein the network node include in the following terms at least One: the cloud node in the mist node resided in the mist layer of mist computing architecture and the cloud for residing in cloud computing framework.
6. the method as described in any one of claims 1 to 5, wherein determine that the user will need access the data packet Including the prediction user will be in the second position in second time, and the prediction is based at least one in the following terms Person: timetable or schedule associated with the user, previous traveling mode associated with the user, from social networks The data of extraction, data associated with the user or network preference, data associated with the user or Web vector graphic Habit, one or more associated with the user are reserved or predetermined, navigate or the user of positioning system, current or past is living The instruction that dynamic instruction and the user are traveling at.
7. such as method described in any one of claims 1 to 6, further includes:
Determine the period that the wherein described user will advance from the first position to the second position;And
Mark resides in the second network node at least one of the following terms: 1) in the wherein user by the institute of traveling Region near one or more positions where the user is estimated during stating the period, 2) it will with the user wherein The associated geographic area in one or more positions and 3) where the user is estimated during the period advanced Logical network near zone associated with one or more of positions;And
The part of the data is moved into second network node, so that the user visits during the period It asks.
8. the method for claim 7, wherein second network node includes in the mist layer for reside in mist computing architecture Mist node.
9. method according to claim 8, wherein the mist node is identified based at least one of the following terms : position, user estimation at least part of the period during of the user during the period Position, the traveling mode of the user, the travel speed of the user, estimation travel path associated with the user, institute State one or more mist nodes in user and the mist layer proximity and the wherein user will be described in traveling The characteristic or topology of at least one of the addressable wireless network of user or described mist layer during period.
10. method as claimed in claim 9, further includes:
The part of the data is moved from the mist node in second time based at least one of the following terms Move on to the network node: 1) user be in the first near zone of the second position first determine or 2) The user is in the second judgement outside the second near zone of the mist node;
Wherein, the part for being partly comprised in the data of the data by when the mist node trustship to the number According to one or more changing of making of the part.
11. method as claimed in claim 10, wherein the network node includes the second mist node and Yun Jiedian, wherein will It includes one of the following terms that the part of the data, which moves to the network node:
First segment of the part of the data is moved into the cloud node, and by the of the part of the data Two segments move to the second mist node;Or
The part of the data is moved into the cloud node, and then based on more compared to user described in the cloud node At least segment of the part of the data is moved to the second mist node by the judgement close to the second mist node.
12. the method as described in any one of claims 1 to 11, further includes:
Determine that the user will need the third time after second time to access the data from the first position;
Before the third time, at least described part of the data is migrated back described first from the network node It sets.
13. a kind of system, comprising:
One or more processors;And
It is wherein stored at least one computer readable storage medium of instruction, described instruction is by one or more of processing It includes the operation of the following terms that device, which executes one or more of processors:
The data that user will need to store at the access first position of the second position in the second time are determined in first time;
Network node is identified, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
Determine first service parameter associated with the first network connection between the calculating equipment and the first position;
Determine second service parameter associated with the second network connection between the calculating equipment and the network node; And
When there is the second service parameter service parameter more higher than the first service parameter to score, at described second Between before a part of the data moved into the network node from the first position.
14. it system as claimed in claim 13, is stored with extra-instruction at least one described computer readable storage medium, These extra-instructions make when being executed by one or more of processors the execution of one or more of processors include with The operation of lower items:
The downtime for determining the user, the user described in the downtime will not need to access the data, described to delay The machine time is after the first time and before second time;And
Wherein, the migration of the part of the data is executed during the downtime.
15. system as claimed in claim 14, it is stored with extra-instruction at least one described computer readable storage medium, These extra-instructions make when being executed by one or more of processors the execution of one or more of processors include with The operation of lower items:
Determine the third place that the user has advanced to outside the threshold range in the network node;And
At least part of the data is removed from the network node.
16. the system as described in any one of claim 13 to 15, wherein the network node is first network node, institute It states at least one computer readable storage medium and is stored with extra-instruction, these extra-instructions are by one or more of places It includes the operation of the following terms that reason device, which executes one or more of processors when executing:
Determine the period that the wherein described user will advance to the second position;And
Mark resides in the second network node at least one of the following terms: 1) in the wherein user by the institute of traveling The range of one or more positions where the user is estimated during stating the period, 2) it will advance with the user wherein The period during the user be estimated where the associated geographic area in one or more of positions and 3) Logical network near zone associated with one or more of positions;And
At least segment of the part of the data is moved into second network node, so that the user is when described Between access during section;
Wherein, second network node includes the mist node in the mist layer for reside in mist computing architecture.
17. a kind of non-transient computer readable storage medium for being stored with instruction, described instruction make when being executed by processor The processor executes the operation including the following terms:
Determine data of the user by needs in future time from trustship at remote location access homing position;
Mark resides in one or more network nodes at least one of the following terms: the Logic Networks of the remote location The Near Threshold region of network near zone, the same geographical area of the remote location and the remote location;And
Before the future time by a part of the data of trustship at the homing position move to it is one or Multiple network nodes.
18. non-transient computer readable storage medium as claimed in claim 17, is stored with extra-instruction, these extra-instructions Executing the processor includes the operation of the following terms:
Determine the period that the wherein described user will advance to the remote location;
Mark resides in network node at least one of the following terms: 1) the wherein user by traveling it is described when Between one or more positions where the user is estimated during section range and 2) will advance with the user wherein The period during the user be estimated where the associated geographic area in one or more of positions;And
At least segment of the part of the data is moved into the network node, so that the user is in the period Period access.
19. non-transient computer readable storage medium as claimed in claim 18, in which:
The network node includes the mist node in the mist layer for reside in mist computing architecture;And
The mist node is identified based at least one of the following terms:
The current location of the user;
Estimated location of the user during at least part of the period;
The traveling mode of the user;
The travel speed of the user;
Estimation travel path associated with the user;
The proximity of one or more mist nodes of the user into the mist layer;And
The topology or characteristic of at least one of the following terms: the wherein user will during the period of traveling it is described The addressable wireless network of user, the mist layer and the cloud computing framework.
20. non-transient computer readable storage medium as claimed in claim 19, is stored with extra-instruction, these extra-instructions Executing the processor includes the operation of the following terms:
The part of the data is moved from the mist node in the future time based at least one of the following terms Move on to one or more of network nodes: what 1) user was in the first near zone of the remote location first sentences Determine or 2) user is in the second judgement outside the second near zone of the mist node;
Wherein, at least segment of the part for being partly comprised in the data of the data is by the mist node trustship When at least segment of the part of the data make it is one or more change, it is and wherein, one or more of Network node includes the second mist node.
21. a kind of device, comprising:
For determining the data that user will need to store at the access first position of the second position in the second time in first time Component;
For identifying the component of network node, the network node:
The data stored at the first position can be stored;And
It can be accessed by calculating equipment from the second position;
For determining first service associated with the first network connection between the calculating equipment and the first position The component of parameter;
For determining second service associated with the second network connection between the calculating equipment and the network node The component of parameter;And
For when there is the second service parameter service parameter more higher than the first service parameter to score, described the A part of the data is moved into the component of the network node from the first position and is used to lead to before two times Cross portion of the network node to the calculating equipment offer from the second position to the access of the part of the data Part.
22. device as claimed in claim 21, further includes: for realizing according to any one of claim 2 to 12 The component of method.
23. computer program, computer program product or the logic of a kind of coding on a tangible computer-readable medium, including For realizing the instruction of method according to any one of claims 1 to 12.
CN201780062108.5A 2016-10-10 2017-07-28 Orchestration system for migrating user data and services based on user information Active CN109844728B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US15/289,755 US10523592B2 (en) 2016-10-10 2016-10-10 Orchestration system for migrating user data and services based on user information
US15/289,755 2016-10-10
PCT/US2017/044437 WO2018071086A1 (en) 2016-10-10 2017-07-28 Orchestration system for migrating user data and services based on user information

Publications (2)

Publication Number Publication Date
CN109844728A true CN109844728A (en) 2019-06-04
CN109844728B CN109844728B (en) 2023-09-15

Family

ID=59656183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780062108.5A Active CN109844728B (en) 2016-10-10 2017-07-28 Orchestration system for migrating user data and services based on user information

Country Status (4)

Country Link
US (3) US10523592B2 (en)
EP (1) EP3523733A1 (en)
CN (1) CN109844728B (en)
WO (1) WO2018071086A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929317A (en) * 2019-10-17 2020-03-27 广联达科技股份有限公司 Method, system and computer readable storage medium for automatically complementing user component modeling information
CN111935784A (en) * 2020-08-12 2020-11-13 重庆邮电大学 Content caching method based on federal learning in fog computing network
CN113614692A (en) * 2020-02-19 2021-11-05 茨特里克斯系统公司 Migration of desktop workloads
CN114207570A (en) * 2019-08-07 2022-03-18 国际商业机器公司 Techniques for identifying segments of an information space by active adaptation to an environmental context
CN114270322A (en) * 2019-08-28 2022-04-01 国际商业机器公司 Data relocation management in data center networks
CN114296405A (en) * 2020-09-22 2022-04-08 罗克韦尔自动化技术公司 Implementation of serverless functionality using container orchestration systems and operating technology devices
CN115866047A (en) * 2023-01-31 2023-03-28 华控清交信息科技(北京)有限公司 Data redirection method and device in multi-party security computing and electronic equipment

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10756970B1 (en) * 2019-02-20 2020-08-25 Amdocs Development Limited System, method, and computer program for automatic reconfiguration of a communication network
WO2015172107A1 (en) 2014-05-09 2015-11-12 Nutanix, Inc. Mechanism for providing external access to a secured networked virtualization environment
US10719305B2 (en) 2016-02-12 2020-07-21 Nutanix, Inc. Virtualized file server tiers
US11218418B2 (en) 2016-05-20 2022-01-04 Nutanix, Inc. Scalable leadership election in a multi-processing computing environment
US10171622B2 (en) * 2016-05-23 2019-01-01 International Business Machines Corporation Dynamic content reordering for delivery to mobile devices
US9749412B1 (en) * 2016-09-21 2017-08-29 International Business Machines Corporation Predictive file synchronization
US9906401B1 (en) 2016-11-22 2018-02-27 Gigamon Inc. Network visibility appliances for cloud computing architectures
US11568073B2 (en) 2016-12-02 2023-01-31 Nutanix, Inc. Handling permissions for virtualized file servers
US11562034B2 (en) 2016-12-02 2023-01-24 Nutanix, Inc. Transparent referrals for distributed file servers
US10728090B2 (en) * 2016-12-02 2020-07-28 Nutanix, Inc. Configuring network segmentation for a virtualization environment
US10824455B2 (en) 2016-12-02 2020-11-03 Nutanix, Inc. Virtualized server systems and methods including load balancing for virtualized file servers
US11294777B2 (en) 2016-12-05 2022-04-05 Nutanix, Inc. Disaster recovery for distributed file servers, including metadata fixers
US11288239B2 (en) 2016-12-06 2022-03-29 Nutanix, Inc. Cloning virtualized file servers
US11281484B2 (en) 2016-12-06 2022-03-22 Nutanix, Inc. Virtualized server systems and methods including scaling of file system virtual machines
US10423634B1 (en) 2016-12-27 2019-09-24 EMC IP Holding Company LLC Temporal queries on secondary storage
US10353603B1 (en) * 2016-12-27 2019-07-16 EMC IP Holding Company LLC Storage container based replication services
US11080245B2 (en) * 2017-02-10 2021-08-03 DaStratum, Inc. Multi-tier cloud file system
US10169973B2 (en) * 2017-03-08 2019-01-01 International Business Machines Corporation Discontinuing display of virtual content and providing alerts based on hazardous physical obstructions
US11368872B2 (en) * 2017-03-27 2022-06-21 Nec Corporation Communication apparatus, base station, radio resource allocation method, and computer readable medium
US10171377B2 (en) * 2017-04-18 2019-01-01 International Business Machines Corporation Orchestrating computing resources between different computing environments
US10691945B2 (en) 2017-07-14 2020-06-23 International Business Machines Corporation Altering virtual content based on the presence of hazardous physical obstructions
US11194836B2 (en) * 2017-09-13 2021-12-07 International Business Machines Corporation Distributed data storage
US10972579B2 (en) * 2017-10-13 2021-04-06 Nebbiolo Technologies, Inc. Adaptive scheduling for edge devices and networks
CA3082082A1 (en) 2017-11-10 2019-05-16 Lvis Corporation Efficacy and/or therapeutic parameter recommendation using individual patient data and therapeutic brain network maps
EP3522013B1 (en) * 2018-02-01 2020-04-01 Siemens Aktiengesellschaft Method and system for migration of containers in a container orchestration platform between compute nodes
US20190273779A1 (en) * 2018-03-01 2019-09-05 Hewlett Packard Enterprise Development Lp Execution of software on a remote computing system
US11086826B2 (en) 2018-04-30 2021-08-10 Nutanix, Inc. Virtualized server systems and methods including domain joining techniques
US11096225B2 (en) * 2018-06-26 2021-08-17 Idag Holdings, Inc. Methods, apparatuses and systems directed to resource solicitation for Fog-RAN
EP3820118A4 (en) * 2018-07-06 2022-03-09 Hyundai Motor Company Resource management method and device
US11194680B2 (en) 2018-07-20 2021-12-07 Nutanix, Inc. Two node clusters recovery on a failure
CN109474659B (en) * 2018-09-11 2022-01-18 深圳市亿兆互联技术有限公司 Intelligent tourist party management system based on LoRa
US11150931B2 (en) * 2018-10-30 2021-10-19 Hewlett Packard Enterprise Development Lp Virtual workload migrations
US11770447B2 (en) 2018-10-31 2023-09-26 Nutanix, Inc. Managing high-availability file servers
US10540388B1 (en) * 2018-11-02 2020-01-21 International Business Machines Corporation Location-aware intelligent data migration and delivery
CN109347975B (en) * 2018-11-18 2021-08-24 上海无线通信研究中心 Internet of vehicles low-delay communication method, terminal and system
EP3683742A1 (en) 2019-01-18 2020-07-22 Naver Corporation Method for computing at least one itinerary from a departure location to an arrival location
US11157543B2 (en) * 2019-03-26 2021-10-26 Rovi Guides, Inc. Systems and methods for generating bandwidth constrained recommendations
US11206306B2 (en) * 2019-05-21 2021-12-21 Cobalt Iron, Inc. Analytics based cloud brokering of data protection operations system and method
EP3745331A1 (en) * 2019-05-29 2020-12-02 Naver Corporation Methods for preprocessing a set of non-scheduled lines within a multimodal transportation network of predetermined stations and for computing at least one itinerary from a departure location to an arrival location
US11228551B1 (en) 2020-02-12 2022-01-18 Snap Inc. Multiple gateway message exchange
US11516167B2 (en) 2020-03-05 2022-11-29 Snap Inc. Storing data based on device location
US11184433B2 (en) * 2020-03-31 2021-11-23 Microsoft Technology Licensing, Llc Container mobility based on border gateway protocol prefixes
US11436117B2 (en) 2020-05-08 2022-09-06 International Business Machines Corporation Context aware dynamic relative positioning of fog nodes in a fog computing ecosystem
US11768809B2 (en) 2020-05-08 2023-09-26 Nutanix, Inc. Managing incremental snapshots for fast leader node bring-up
US11178527B1 (en) 2020-05-12 2021-11-16 International Business Machines Corporation Method and apparatus for proactive data hinting through dedicated traffic channel of telecom network
CN112073542B (en) * 2020-11-12 2021-02-05 腾讯科技(深圳)有限公司 Fog node scheduling method and device, computer equipment and storage medium
US20230121238A1 (en) * 2021-10-15 2023-04-20 International Business Machines Corporation Dynamic virtual network access
US11588910B2 (en) * 2022-03-14 2023-02-21 Meta Platforms Technologies, Llc Offloading visual frames to a gateway device
US11880950B2 (en) 2022-03-14 2024-01-23 Meta Platforms Technologies, Llc Selective offload of workloads to edge devices
US11928038B2 (en) 2022-06-21 2024-03-12 International Business Machines Corporation Managing data sets based on user activity
US20240073155A1 (en) * 2022-08-24 2024-02-29 At&T Intellectual Property I, L.P. System and method adapted to simplify user equipment requirements during travel

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101636967A (en) * 2007-03-22 2010-01-27 微软公司 The remote data access techniques that is used for portable set
US20120214506A1 (en) * 2011-02-22 2012-08-23 Ole-Petter Skaaksrud Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture
US20130073670A1 (en) * 2011-09-15 2013-03-21 Microsoft Corporation Geo-Migration Of User State
US20130144978A1 (en) * 2011-12-02 2013-06-06 International Business Machines Corporation Data relocation in global storage cloud environments
CN103297492A (en) * 2012-02-07 2013-09-11 国际商业机器公司 Migrating data between networked computing environments
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
US20150373108A1 (en) * 2014-06-18 2015-12-24 International Business Machines Corporation Dynamic proximity based networked storage
US20160132784A1 (en) * 2012-02-21 2016-05-12 Comcast Cable Communications, Llc Moveable storage

Family Cites Families (365)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5889896A (en) 1994-02-09 1999-03-30 Meshinsky; John System for performing multiple processes on images of scanned documents
US5812773A (en) 1996-07-12 1998-09-22 Microsoft Corporation System and method for the distribution of hierarchically structured data
US6108782A (en) 1996-12-13 2000-08-22 3Com Corporation Distributed remote monitoring (dRMON) for networks
US6178453B1 (en) 1997-02-18 2001-01-23 Netspeak Corporation Virtual circuit switching architecture
US6298153B1 (en) 1998-01-16 2001-10-02 Canon Kabushiki Kaisha Digital signature method and information communication system and apparatus using such method
US6735631B1 (en) 1998-02-10 2004-05-11 Sprint Communications Company, L.P. Method and system for networking redirecting
US6643260B1 (en) 1998-12-18 2003-11-04 Cisco Technology, Inc. Method and apparatus for implementing a quality of service policy in a data communications network
US20040095237A1 (en) 1999-01-09 2004-05-20 Chen Kimball C. Electronic message delivery system utilizable in the monitoring and control of remote equipment and method of same
EP1096360B1 (en) 1999-10-25 2004-09-22 Texas Instruments Incorporated Intelligent power management for distributed processing systems
US6707794B1 (en) 1999-11-15 2004-03-16 Networks Associates Technology, Inc. Method, system and computer program product for physical link layer handshake protocol analysis
US6343290B1 (en) 1999-12-22 2002-01-29 Celeritas Technologies, L.L.C. Geographic network management system
US6683873B1 (en) 1999-12-27 2004-01-27 Cisco Technology, Inc. Methods and apparatus for redirecting network traffic
JP4162347B2 (en) 2000-01-31 2008-10-08 富士通株式会社 Network system
US7058706B1 (en) 2000-03-31 2006-06-06 Akamai Technologies, Inc. Method and apparatus for determining latency between multiple servers and a client
US6721804B1 (en) 2000-04-07 2004-04-13 Danger, Inc. Portal system for converting requested data into a bytecode format based on portal device's graphical capabilities
WO2001092572A1 (en) 2000-06-01 2001-12-06 Nisshinbo Industries, Inc. Kit and method for determining hla type
US7917647B2 (en) 2000-06-16 2011-03-29 Mcafee, Inc. Method and apparatus for rate limiting
US7062571B1 (en) 2000-06-30 2006-06-13 Cisco Technology, Inc. Efficient IP load-balancing traffic distribution using ternary CAMs
US7051078B1 (en) 2000-07-10 2006-05-23 Cisco Technology, Inc. Hierarchical associative memory-based classification system
AU2001288463A1 (en) 2000-08-30 2002-03-13 Citibank, N.A. Method and system for internet hosting and security
US7596784B2 (en) 2000-09-12 2009-09-29 Symantec Operating Corporation Method system and apparatus for providing pay-per-use distributed computing resources
US6996615B1 (en) 2000-09-29 2006-02-07 Cisco Technology, Inc. Highly scalable least connections load balancing
US7054930B1 (en) 2000-10-26 2006-05-30 Cisco Technology, Inc. System and method for propagating filters
US20020143928A1 (en) 2000-12-07 2002-10-03 Maltz David A. Method and system for collection and storage of traffic data in a computer network
US7167965B2 (en) * 2001-04-30 2007-01-23 Hewlett-Packard Development Company, L.P. Method and system for online data migration on storage systems with performance guarantees
US7065482B2 (en) 2001-05-17 2006-06-20 International Business Machines Corporation Internet traffic analysis tool
US7002965B1 (en) 2001-05-21 2006-02-21 Cisco Technology, Inc. Method and apparatus for using ternary and binary content-addressable memory stages to classify packets
AU2002304227A1 (en) 2001-06-11 2002-12-23 Bluefire Security Technology Packet filtering system and methods
US7212490B1 (en) 2001-07-06 2007-05-01 Cisco Technology, Inc. Dynamic load balancing for dual ring topology networks
US7028098B2 (en) 2001-07-20 2006-04-11 Nokia, Inc. Selective routing of data flows using a TCAM
JP2003345612A (en) 2002-05-28 2003-12-05 Sony Corp Arithmetic processing system, task control method on computer system, and computer program
US8103755B2 (en) 2002-07-02 2012-01-24 Arbor Networks, Inc. Apparatus and method for managing a provider network
US7313667B1 (en) 2002-08-05 2007-12-25 Cisco Technology, Inc. Methods and apparatus for mapping fields of entries into new values and combining these mapped values into mapped entries for use in lookup operations such as for packet processing
US20040131059A1 (en) 2002-09-19 2004-07-08 Ram Ayyakad Single-pass packet scan
US7536476B1 (en) 2002-12-20 2009-05-19 Cisco Technology, Inc. Method for performing tree based ACL lookups
US6733449B1 (en) 2003-03-20 2004-05-11 Siemens Medical Solutions Usa, Inc. System and method for real-time streaming of ultrasound data to a diagnostic medical ultrasound streaming application
US7567504B2 (en) 2003-06-30 2009-07-28 Microsoft Corporation Network load balancing with traffic routing
US20050060418A1 (en) 2003-09-17 2005-03-17 Gennady Sorokopud Packet classification
US7474653B2 (en) 2003-12-05 2009-01-06 Hewlett-Packard Development Company, L.P. Decision cache using multi-key lookup
US7496661B1 (en) 2004-03-29 2009-02-24 Packeteer, Inc. Adaptive, application-aware selection of differentiated network services
EP1762076A2 (en) 2004-06-25 2007-03-14 Koninklijke Philips Electronics N.V. Anonymous certificates with anonymous certificate show
US7379846B1 (en) 2004-06-29 2008-05-27 Sun Microsystems, Inc. System and method for automated problem diagnosis
US7881957B1 (en) 2004-11-16 2011-02-01 Amazon Technologies, Inc. Identifying tasks for task performers based on task subscriptions
WO2006058065A2 (en) 2004-11-23 2006-06-01 Nighthawk Radiology Services Methods and systems for providing data across a network
US7548562B2 (en) 2004-12-14 2009-06-16 Agilent Technologies, Inc. High speed acquisition system that allows capture from a packet network and streams the data to a storage medium
US20060146825A1 (en) 2004-12-30 2006-07-06 Padcom, Inc. Network based quality of service
US7808897B1 (en) 2005-03-01 2010-10-05 International Business Machines Corporation Fast network security utilizing intrusion prevention systems
US20110016214A1 (en) 2009-07-15 2011-01-20 Cluster Resources, Inc. System and method of brokering cloud computing resources
WO2006107531A2 (en) 2005-03-16 2006-10-12 Cluster Resources, Inc. Simple integration of an on-demand compute environment
US9015324B2 (en) 2005-03-16 2015-04-21 Adaptive Computing Enterprises, Inc. System and method of brokering cloud computing resources
US7480672B2 (en) 2005-03-31 2009-01-20 Sap Ag Multiple log queues in a database management system
US7606147B2 (en) 2005-04-13 2009-10-20 Zeugma Systems Inc. Application aware traffic shaping service node positioned between the access and core networks
US9065727B1 (en) 2012-08-31 2015-06-23 Google Inc. Device identifier similarity models derived from online event signals
US11327674B2 (en) * 2012-06-05 2022-05-10 Pure Storage, Inc. Storage vault tiering and data migration in a distributed storage network
US7607043B2 (en) 2006-01-04 2009-10-20 International Business Machines Corporation Analysis of mutually exclusive conflicts among redundant devices
US7613955B2 (en) 2006-01-06 2009-11-03 Microsoft Corporation Collecting debug data from a wireless device
US8028071B1 (en) 2006-02-15 2011-09-27 Vmware, Inc. TCP/IP offload engine virtualization system and methods
US8040895B2 (en) 2006-03-22 2011-10-18 Cisco Technology, Inc. Method and system for removing dead access control entries (ACEs)
US7778183B2 (en) 2006-03-31 2010-08-17 International Business Machines Corporation Data replica selector
US20090019367A1 (en) 2006-05-12 2009-01-15 Convenos, Llc Apparatus, system, method, and computer program product for collaboration via one or more networks
US7761596B2 (en) 2006-06-30 2010-07-20 Telefonaktiebolaget L M Ericsson (Publ) Router and method for server load balancing
US8533687B1 (en) 2009-11-30 2013-09-10 dynaTrade Software GmbH Methods and system for global real-time transaction tracing
US8194664B2 (en) 2006-10-10 2012-06-05 Cisco Technology, Inc. Two-level load-balancing of network traffic over an MPLS network
US11496598B2 (en) * 2006-12-11 2022-11-08 International Business Machines Corporation Caching data at network processing nodes based on device location
JP4333736B2 (en) 2006-12-19 2009-09-16 村田機械株式会社 Relay server and client terminal
US7653063B2 (en) 2007-01-05 2010-01-26 Cisco Technology, Inc. Source address binding check
US8103773B2 (en) 2007-01-19 2012-01-24 Cisco Technology, Inc. Transactional application processing in a distributed environment
US8176486B2 (en) 2007-02-15 2012-05-08 Clearcube Technology, Inc. Maintaining a pool of free virtual machines on a server computer
US8406141B1 (en) 2007-03-12 2013-03-26 Cybertap, Llc Network search methods and systems
US7853998B2 (en) 2007-03-22 2010-12-14 Mocana Corporation Firewall propagation
US7773510B2 (en) 2007-05-25 2010-08-10 Zeugma Systems Inc. Application routing in a distributed compute environment
US9678803B2 (en) 2007-06-22 2017-06-13 Red Hat, Inc. Migration of network entities to a cloud infrastructure
US9477572B2 (en) 2007-06-22 2016-10-25 Red Hat, Inc. Performing predictive modeling of virtual machine relationships
US8301740B2 (en) 2007-06-27 2012-10-30 Ca, Inc. Autonomic control of a distributed computing system using dynamically assembled resource chains
US8205208B2 (en) 2007-07-24 2012-06-19 Internaitonal Business Machines Corporation Scheduling grid jobs using dynamic grid scheduling policy
US8423470B2 (en) 2007-09-21 2013-04-16 Microsoft Corporation Distributed secure anonymous conferencing
US7769767B2 (en) * 2007-09-27 2010-08-03 Domingo Enterprises, Llc System and method for filtering content on a mobile device based on contextual tagging
US8284664B1 (en) 2007-09-28 2012-10-09 Juniper Networks, Inc. Redirecting data units to service modules based on service tags and a redirection table
US8121117B1 (en) 2007-10-01 2012-02-21 F5 Networks, Inc. Application layer network traffic prioritization
US8862765B2 (en) 2007-10-18 2014-10-14 Arris Solutions, Inc. Fair bandwidth redistribution algorithm
US8583797B2 (en) 2008-01-07 2013-11-12 Ca, Inc. Interdependent capacity levels of resources in a distributed computing system
US20090178058A1 (en) 2008-01-09 2009-07-09 Microsoft Corporation Application Aware Networking
US8291474B2 (en) 2008-04-16 2012-10-16 Oracle America, Inc. Using opaque groups in a federated identity management environment
US8320916B2 (en) * 2008-05-20 2012-11-27 Alcatel Lucent Method and apparatus for pre-fetching data in a mobile network environment using edge data storage
US8935692B2 (en) 2008-05-22 2015-01-13 Red Hat, Inc. Self-management of virtual machines in cloud-based networks
US8943497B2 (en) 2008-05-29 2015-01-27 Red Hat, Inc. Managing subscriptions for cloud-based virtual machines
US8171415B2 (en) 2008-06-11 2012-05-01 International Business Machines Corporation Outage management portal leveraging back-end resources to create a role and user tailored front-end interface for coordinating outage responses
US8429675B1 (en) 2008-06-13 2013-04-23 Netapp, Inc. Virtual machine communication
US9069599B2 (en) 2008-06-19 2015-06-30 Servicemesh, Inc. System and method for a cloud computing abstraction layer with security zone facilities
AU2009259876A1 (en) 2008-06-19 2009-12-23 Servicemesh, Inc. Cloud computing gateway, cloud computing hypervisor, and methods for implementing same
US8175103B2 (en) 2008-06-26 2012-05-08 Rockstar Bidco, LP Dynamic networking of virtual machines
US8479192B2 (en) 2008-06-27 2013-07-02 Xerox Corporation Dynamic XPS filter
US8250215B2 (en) 2008-08-12 2012-08-21 Sap Ag Method and system for intelligently leveraging cloud computing resources
US8706878B1 (en) 2008-08-21 2014-04-22 United Services Automobile Association Preferential loading in data centers
US8234522B2 (en) 2008-09-04 2012-07-31 Telcordia Technologies, Inc. Computing diagnostic explanations of network faults from monitoring data
US8238256B2 (en) 2008-09-08 2012-08-07 Nugent Raymond M System and method for cloud computing
US8041714B2 (en) 2008-09-15 2011-10-18 Palantir Technologies, Inc. Filter chains with associated views for exploring large data sets
CN101394360B (en) 2008-11-10 2011-07-20 北京星网锐捷网络技术有限公司 Processing method, access device and communication system for address resolution protocol
US9621341B2 (en) 2008-11-26 2017-04-11 Microsoft Technology Licensing, Llc Anonymous verifiable public key certificates
EP2211502A1 (en) 2009-01-22 2010-07-28 IBBT vzw Management system and method for configuring a network for transferring media data
US8566362B2 (en) 2009-01-23 2013-10-22 Nasuni Corporation Method and system for versioned file system using structured data representations
US20120005724A1 (en) 2009-02-09 2012-01-05 Imera Systems, Inc. Method and system for protecting private enterprise resources in a cloud computing environment
US8510735B2 (en) 2009-02-11 2013-08-13 International Business Machines Corporation Runtime environment for virtualizing information technology appliances
US8341427B2 (en) 2009-02-16 2012-12-25 Microsoft Corporation Trusted cloud computing and services framework
US9473555B2 (en) 2012-12-31 2016-10-18 The Nielsen Company (Us), Llc Apparatus, system and methods for portable device tracking using temporary privileged access
EP2228719A1 (en) 2009-03-11 2010-09-15 Zimory GmbH Method of executing a virtual machine, computing system and computer program
US8271615B2 (en) 2009-03-31 2012-09-18 Cloud Connex, Llc Centrally managing and monitoring software as a service (SaaS) applications
US8560639B2 (en) 2009-04-24 2013-10-15 Microsoft Corporation Dynamic placement of replica data
US8516106B2 (en) 2009-05-18 2013-08-20 International Business Machines Corporation Use tag clouds to visualize components related to an event
TW201112006A (en) 2009-05-29 2011-04-01 Ibm Computer system, method and program product
US8639787B2 (en) 2009-06-01 2014-01-28 Oracle International Corporation System and method for creating or reconfiguring a virtual server image for cloud deployment
US20100318609A1 (en) 2009-06-15 2010-12-16 Microsoft Corporation Bridging enterprise networks into cloud
KR101626117B1 (en) 2009-06-22 2016-05-31 삼성전자주식회사 Client, brokerage sever and method for providing cloud storage
US8281149B2 (en) 2009-06-23 2012-10-02 Google Inc. Privacy-preserving flexible anonymous-pseudonymous access
US8244559B2 (en) 2009-06-26 2012-08-14 Microsoft Corporation Cloud computing resource broker
US8612439B2 (en) 2009-06-30 2013-12-17 Commvault Systems, Inc. Performing data storage operations in a cloud storage environment, including searching, encryption and indexing
US8234377B2 (en) 2009-07-22 2012-07-31 Amazon Technologies, Inc. Dynamically migrating computer networks
US8966475B2 (en) 2009-08-10 2015-02-24 Novell, Inc. Workload management for heterogeneous hosts in a computing system environment
US8271653B2 (en) 2009-08-31 2012-09-18 Red Hat, Inc. Methods and systems for cloud management using multiple cloud management schemes to allow communication between independently controlled clouds
US8510469B2 (en) 2009-08-31 2013-08-13 Cisco Technology, Inc. Measuring attributes of client-server applications
US8862720B2 (en) 2009-08-31 2014-10-14 Red Hat, Inc. Flexible cloud management including external clouds
US20110072489A1 (en) 2009-09-23 2011-03-24 Gilad Parann-Nissany Methods, devices, and media for securely utilizing a non-secured, distributed, virtualized network resource with applications to cloud-computing security and management
JP2011076292A (en) 2009-09-30 2011-04-14 Hitachi Ltd Method for designing failure cause analysis rule in accordance with available device information, and computer
US8532108B2 (en) 2009-09-30 2013-09-10 Alcatel Lucent Layer 2 seamless site extension of enterprises in cloud computing
US8880682B2 (en) 2009-10-06 2014-11-04 Emc Corporation Integrated forensics platform for analyzing IT resources consumed to derive operational and architectural recommendations
US8812490B1 (en) * 2009-10-30 2014-08-19 Microstrategy Incorporated Data source joins
US20110110382A1 (en) 2009-11-10 2011-05-12 Cisco Technology, Inc., A Corporation Of California Distribution of Packets Among PortChannel Groups of PortChannel Links
US8611356B2 (en) 2009-11-13 2013-12-17 Exalt Communications Incorporated Apparatus for ethernet traffic aggregation of radio links
US20110126197A1 (en) 2009-11-25 2011-05-26 Novell, Inc. System and method for controlling cloud and virtualized data centers in an intelligent workload management system
CN101719930A (en) 2009-11-27 2010-06-02 南京邮电大学 Cloud money-based hierarchical cloud computing system excitation method
GB2475897A (en) 2009-12-04 2011-06-08 Creme Software Ltd Resource allocation using estimated time to complete jobs in a grid or cloud computing environment
US8037187B2 (en) 2009-12-11 2011-10-11 International Business Machines Corporation Resource exchange management within a cloud computing environment
US20130117337A1 (en) 2009-12-23 2013-05-09 Gary M. Dunham Locally Connected Cloud Storage Device
US9959147B2 (en) 2010-01-13 2018-05-01 Vmware, Inc. Cluster configuration through host ranking
US9883008B2 (en) 2010-01-15 2018-01-30 Endurance International Group, Inc. Virtualization of multiple distinct website hosting architectures
WO2011091056A1 (en) 2010-01-19 2011-07-28 Servicemesh, Inc. System and method for a cloud computing abstraction layer
US8301746B2 (en) 2010-01-26 2012-10-30 International Business Machines Corporation Method and system for abstracting non-functional requirements based deployment of virtual machines
US8898457B2 (en) 2010-02-26 2014-11-25 Red Hat, Inc. Automatically generating a certificate operation request
US9129086B2 (en) 2010-03-04 2015-09-08 International Business Machines Corporation Providing security services within a cloud computing environment
US20110239039A1 (en) 2010-03-26 2011-09-29 Dieffenbach Devon C Cloud computing enabled robust initialization and recovery of it services
US20110252327A1 (en) 2010-03-26 2011-10-13 Actiance, Inc. Methods, systems, and user interfaces for graphical summaries of network activities
US8886806B2 (en) 2010-04-07 2014-11-11 Accenture Global Services Limited Generic control layer in a cloud environment
US8243598B2 (en) 2010-04-26 2012-08-14 International Business Machines Corporation Load-balancing via modulus distribution and TCP flow redirection due to server overload
US8345692B2 (en) 2010-04-27 2013-01-01 Cisco Technology, Inc. Virtual switching overlay for cloud computing
US8547974B1 (en) 2010-05-05 2013-10-01 Mu Dynamics Generating communication protocol test cases based on network traffic
US8719804B2 (en) 2010-05-05 2014-05-06 Microsoft Corporation Managing runtime execution of applications on cloud computing systems
US8688792B2 (en) 2010-05-06 2014-04-01 Nec Laboratories America, Inc. Methods and systems for discovering configuration data
US8910278B2 (en) 2010-05-18 2014-12-09 Cloudnexa Managing services in a cloud computing environment
CN102255933B (en) 2010-05-20 2016-03-30 中兴通讯股份有限公司 Cloud service intermediary, cloud computing method and cloud system
US8954564B2 (en) 2010-05-28 2015-02-10 Red Hat, Inc. Cross-cloud vendor mapping service in cloud marketplace
US8477610B2 (en) 2010-05-31 2013-07-02 Microsoft Corporation Applying policies to schedule network bandwidth among virtual machines
WO2011152910A1 (en) 2010-06-02 2011-12-08 Vmware, Inc. Securing customer virtual machines in a multi-tenant cloud
US8352415B2 (en) 2010-06-15 2013-01-08 International Business Machines Corporation Converting images in virtual environments
US8705395B2 (en) 2010-06-15 2014-04-22 Jds Uniphase Corporation Method for time aware inline remote mirroring
US8135979B2 (en) 2010-06-24 2012-03-13 Hewlett-Packard Development Company, L.P. Collecting network-level packets into a data structure in response to an abnormal condition
US9201701B2 (en) 2010-07-16 2015-12-01 Nokia Technologies Oy Method and apparatus for distributing computation closures
TWM394537U (en) 2010-08-17 2010-12-11 Chunghwa Telecom Co Ltd A system for providing web cloud integrated services
US8473557B2 (en) 2010-08-24 2013-06-25 At&T Intellectual Property I, L.P. Methods and apparatus to migrate virtual machines between distributive computing networks across a wide area network
US8656023B1 (en) 2010-08-26 2014-02-18 Adobe Systems Incorporated Optimization scheduler for deploying applications on a cloud
US9311158B2 (en) 2010-09-03 2016-04-12 Adobe Systems Incorporated Determining a work distribution model between a client device and a cloud for an application deployed on the cloud
US8539597B2 (en) 2010-09-16 2013-09-17 International Business Machines Corporation Securing sensitive data for cloud computing
US8572241B2 (en) 2010-09-17 2013-10-29 Microsoft Corporation Integrating external and cluster heat map data
US8413145B2 (en) 2010-09-30 2013-04-02 Avaya Inc. Method and apparatus for efficient memory replication for high availability (HA) protection of a virtual machine (VM)
US9128626B2 (en) 2010-10-01 2015-09-08 Peter Chacko Distributed virtual storage cloud architecture and a method thereof
US9110727B2 (en) 2010-10-05 2015-08-18 Unisys Corporation Automatic replication of virtual machines
EP2439637A1 (en) 2010-10-07 2012-04-11 Deutsche Telekom AG Method and system of providing access to a virtual machine distributed in a hybrid cloud network
US8797867B1 (en) 2010-10-18 2014-08-05 Juniper Networks, Inc. Generating and enforcing a holistic quality of service policy in a network
US9075661B2 (en) 2010-10-20 2015-07-07 Microsoft Technology Licensing, Llc Placing objects on hosts using hard and soft constraints
US8909744B2 (en) 2010-10-20 2014-12-09 Hcl Technologies Limited System and method for transitioning to cloud computing environment
US8589355B2 (en) * 2010-10-29 2013-11-19 International Business Machines Corporation Data storage in a cloud
US8407413B1 (en) 2010-11-05 2013-03-26 Netapp, Inc Hardware flow classification for data storage services
US8612615B2 (en) 2010-11-23 2013-12-17 Red Hat, Inc. Systems and methods for identifying usage histories for producing optimized cloud utilization
JP5725812B2 (en) 2010-11-25 2015-05-27 キヤノン株式会社 Document processing apparatus, document processing method, and program
US8560792B2 (en) 2010-12-16 2013-10-15 International Business Machines Corporation Synchronous extent migration protocol for paired storage
US10176018B2 (en) 2010-12-21 2019-01-08 Intel Corporation Virtual core abstraction for cloud computing
US8495356B2 (en) 2010-12-31 2013-07-23 International Business Machines Corporation System for securing virtual machine disks on a remote shared storage subsystem
US8935383B2 (en) 2010-12-31 2015-01-13 Verisign, Inc. Systems, apparatus, and methods for network data analysis
US20120179909A1 (en) 2011-01-06 2012-07-12 Pitney Bowes Inc. Systems and methods for providing individual electronic document secure storage, retrieval and use
US8448171B2 (en) 2011-01-07 2013-05-21 International Business Machines Corporation Communications between virtual machines that have been migrated
US20120182891A1 (en) 2011-01-19 2012-07-19 Youngseok Lee Packet analysis system and method using hadoop based parallel computation
US9225554B2 (en) 2011-01-26 2015-12-29 Cisco Technology, Inc. Device-health-based dynamic configuration of network management systems suited for network operations
US8619568B2 (en) 2011-02-04 2013-12-31 Cisco Technology, Inc. Reassignment of distributed packet flows
US9009697B2 (en) 2011-02-08 2015-04-14 International Business Machines Corporation Hybrid cloud integrator
US9063789B2 (en) 2011-02-08 2015-06-23 International Business Machines Corporation Hybrid cloud integrator plug-in components
US8805951B1 (en) 2011-02-08 2014-08-12 Emc Corporation Virtual machines and cloud storage caching for cloud computing applications
US8832818B2 (en) 2011-02-28 2014-09-09 Rackspace Us, Inc. Automated hybrid connections between multiple environments in a data center
US20120236716A1 (en) 2011-03-14 2012-09-20 Atheros Communications, Inc. Profile-based quality of service for wireless communication systems
KR101544482B1 (en) 2011-03-15 2015-08-21 주식회사 케이티 Cloud center controlling apparatus and cloud center selecting method of the same
US9100188B2 (en) 2011-04-18 2015-08-04 Bank Of America Corporation Hardware-based root of trust for cloud environments
KR101544485B1 (en) 2011-04-25 2015-08-17 주식회사 케이티 Method and apparatus for selecting a node to place a replica in cloud storage system
US8869244B1 (en) 2011-05-03 2014-10-21 Symantec Corporation Techniques for providing role-based access control using dynamic shared accounts
US8806015B2 (en) 2011-05-04 2014-08-12 International Business Machines Corporation Workload-aware placement in private heterogeneous clouds
US9253252B2 (en) 2011-05-06 2016-02-02 Citrix Systems, Inc. Systems and methods for cloud bridging between intranet resources and cloud resources
US9253159B2 (en) 2011-05-06 2016-02-02 Citrix Systems, Inc. Systems and methods for cloud bridging between public and private clouds
US8977754B2 (en) 2011-05-09 2015-03-10 Metacloud Inc. Composite public cloud, method and system
US8590050B2 (en) 2011-05-11 2013-11-19 International Business Machines Corporation Security compliant data storage management
CN102164091B (en) 2011-05-13 2015-01-21 北京星网锐捷网络技术有限公司 Method for building MAC (Media Access Control) address table and provider edge device
US8719627B2 (en) 2011-05-20 2014-05-06 Microsoft Corporation Cross-cloud computing for capacity management and disaster recovery
US9244751B2 (en) 2011-05-31 2016-01-26 Hewlett Packard Enterprise Development Lp Estimating a performance parameter of a job having map and reduce tasks after a failure
US8984104B2 (en) 2011-05-31 2015-03-17 Red Hat, Inc. Self-moving operating system installation in cloud-based network
US9104460B2 (en) 2011-05-31 2015-08-11 Red Hat, Inc. Inter-cloud live migration of virtualization systems
US8959526B2 (en) 2011-06-09 2015-02-17 Microsoft Corporation Scheduling execution of complementary jobs based on resource usage
US8806003B2 (en) 2011-06-14 2014-08-12 International Business Machines Corporation Forecasting capacity available for processing workloads in a networked computing environment
US8547975B2 (en) 2011-06-28 2013-10-01 Verisign, Inc. Parallel processing for multiple instance real-time monitoring
US8589543B2 (en) 2011-07-01 2013-11-19 Cisco Technology, Inc. Virtual data center monitoring
US8959003B2 (en) 2011-07-07 2015-02-17 International Business Machines Corporation Interactive data visualization for trend analysis
US20130036213A1 (en) 2011-08-02 2013-02-07 Masum Hasan Virtual private clouds
US9300539B2 (en) * 2011-08-04 2016-03-29 International Business Machines Corporation Network computing management
US8958298B2 (en) 2011-08-17 2015-02-17 Nicira, Inc. Centralized logical L3 routing
US20140156557A1 (en) 2011-08-19 2014-06-05 Jun Zeng Providing a Simulation Service by a Cloud-Based Infrastructure
US8630291B2 (en) 2011-08-22 2014-01-14 Cisco Technology, Inc. Dynamic multi-path forwarding for shared-media communication networks
EP2674865A4 (en) 2011-09-26 2016-06-01 Hitachi Ltd MANAGEMENT COMPUTER AND METHOD FOR ROOT CAUSE ANALYSiS
CN103023762A (en) 2011-09-27 2013-04-03 阿尔卡特朗讯公司 Cloud computing access gateway and method for providing access to cloud provider for user terminal
US9250941B2 (en) 2011-09-30 2016-02-02 Telefonaktiebolaget L M Ericsson (Publ) Apparatus and method for segregating tenant specific data when using MPLS in openflow-enabled cloud computing
US8560663B2 (en) 2011-09-30 2013-10-15 Telefonaktiebolaget L M Ericsson (Publ) Using MPLS for virtual private cloud network isolation in openflow-enabled cloud computing
US20130091557A1 (en) 2011-10-11 2013-04-11 Wheel Innovationz, Inc. System and method for providing cloud-based cross-platform application stores for mobile computing devices
DE102012217202B4 (en) 2011-10-12 2020-06-18 International Business Machines Corporation Method and system for optimizing the placement of virtual machines in cloud computing environments
US9201690B2 (en) 2011-10-21 2015-12-01 International Business Machines Corporation Resource aware scheduling in a distributed computing environment
US8789179B2 (en) 2011-10-28 2014-07-22 Novell, Inc. Cloud protection techniques
US9311160B2 (en) 2011-11-10 2016-04-12 Verizon Patent And Licensing Inc. Elastic cloud networking
US8832249B2 (en) 2011-11-30 2014-09-09 At&T Intellectual Property I, L.P. Methods and apparatus to adjust resource allocation in a distributive computing network
US20130152076A1 (en) 2011-12-07 2013-06-13 Cisco Technology, Inc. Network Access Control Policy for Virtual Machine Migration
US9113376B2 (en) 2011-12-09 2015-08-18 Cisco Technology, Inc. Multi-interface mobility
US8694995B2 (en) 2011-12-14 2014-04-08 International Business Machines Corporation Application initiated negotiations for resources meeting a performance parameter in a virtualized computing environment
US8832262B2 (en) 2011-12-15 2014-09-09 Cisco Technology, Inc. Normalizing network performance indexes
US10134056B2 (en) 2011-12-16 2018-11-20 Ebay Inc. Systems and methods for providing information based on location
US8860777B2 (en) 2011-12-22 2014-10-14 Verizon Patent And Licensing Inc. Multi-enterprise video conference service
US8547379B2 (en) 2011-12-29 2013-10-01 Joyent, Inc. Systems, methods, and media for generating multidimensional heat maps
US20130173796A1 (en) * 2011-12-30 2013-07-04 United Video Properties, Inc. Systems and methods for managing a media content queue
US8555339B2 (en) 2012-01-06 2013-10-08 International Business Machines Corporation Identifying guests in web meetings
US8908698B2 (en) 2012-01-13 2014-12-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US8732291B2 (en) 2012-01-13 2014-05-20 Accenture Global Services Limited Performance interference model for managing consolidated workloads in QOS-aware clouds
US9529348B2 (en) 2012-01-24 2016-12-27 Emerson Process Management Power & Water Solutions, Inc. Method and apparatus for deploying industrial plant simulators using cloud computing technologies
US9900231B2 (en) 2012-01-27 2018-02-20 Microsoft Technology Licensing, Llc Managing data transfers over network connections based on priority and a data usage plan
US8660129B1 (en) 2012-02-02 2014-02-25 Cisco Technology, Inc. Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks
US9451303B2 (en) 2012-02-27 2016-09-20 The Nielsen Company (Us), Llc Method and system for gathering and computing an audience's neurologically-based reactions in a distributed framework involving remote storage and computing
US10097406B2 (en) 2012-03-19 2018-10-09 Level 3 Communications, Llc Systems and methods for data mobility with a cloud architecture
US9350671B2 (en) 2012-03-22 2016-05-24 Futurewei Technologies, Inc. Supporting software defined networking with application layer traffic optimization
US20130254415A1 (en) 2012-03-26 2013-09-26 F. Brian Fullen Routing requests over a network
EP2645257A3 (en) 2012-03-29 2014-06-18 Prelert Ltd. System and method for visualisation of behaviour within computer infrastructure
FR2988943A1 (en) 2012-03-29 2013-10-04 France Telecom SYSTEM FOR SUPERVISING THE SAFETY OF AN ARCHITECTURE
US8930747B2 (en) 2012-03-30 2015-01-06 Sungard Availability Services, Lp Private cloud replication and recovery
US9164795B1 (en) 2012-03-30 2015-10-20 Amazon Technologies, Inc. Secure tunnel infrastructure between hosts in a hybrid network environment
US9313048B2 (en) 2012-04-04 2016-04-12 Cisco Technology, Inc. Location aware virtual service provisioning in a hybrid cloud environment
US8856339B2 (en) 2012-04-04 2014-10-07 Cisco Technology, Inc. Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environment
US9201704B2 (en) 2012-04-05 2015-12-01 Cisco Technology, Inc. System and method for migrating application virtual machines in a network environment
US8775576B2 (en) 2012-04-17 2014-07-08 Nimbix, Inc. Reconfigurable cloud computing
US9203784B2 (en) 2012-04-24 2015-12-01 Cisco Technology, Inc. Distributed virtual switch architecture for a hybrid cloud
US8918510B2 (en) 2012-04-27 2014-12-23 Hewlett-Packard Development Company, L. P. Evaluation of cloud computing services
US9223634B2 (en) 2012-05-02 2015-12-29 Cisco Technology, Inc. System and method for simulating virtual machine migration in a network environment
WO2013186870A1 (en) 2012-06-13 2013-12-19 株式会社日立製作所 Service monitoring system and service monitoring method
US9183031B2 (en) 2012-06-19 2015-11-10 Bank Of America Corporation Provisioning of a virtual machine by using a secured zone of a cloud environment
US8938775B1 (en) 2012-06-27 2015-01-20 Amazon Technologies, Inc. Dynamic data loss prevention in a multi-tenant environment
US9215131B2 (en) 2012-06-29 2015-12-15 Cisco Technology, Inc. Methods for exchanging network management messages using UDP over HTTP protocol
US8909857B2 (en) 2012-06-29 2014-12-09 Broadcom Corporation Efficient storage of ACL frequent ranges in a ternary memory
US20140006585A1 (en) 2012-06-29 2014-01-02 Futurewei Technologies, Inc. Providing Mobility in Overlay Networks
US20140052877A1 (en) 2012-08-16 2014-02-20 Wenbo Mao Method and apparatus for tenant programmable logical network for multi-tenancy cloud datacenters
US9167050B2 (en) 2012-08-16 2015-10-20 Futurewei Technologies, Inc. Control pool based enterprise policy enabler for controlled cloud access
US9582221B2 (en) 2012-08-24 2017-02-28 Vmware, Inc. Virtualization-aware data locality in distributed data processing
US9047181B2 (en) 2012-09-07 2015-06-02 Splunk Inc. Visualization of data from clusters
US10097378B2 (en) 2012-09-07 2018-10-09 Cisco Technology, Inc. Efficient TCAM resource sharing
US9069979B2 (en) 2012-09-07 2015-06-30 Oracle International Corporation LDAP-based multi-tenant in-cloud identity management system
US9634922B2 (en) 2012-09-11 2017-04-25 Board Of Regents Of The Nevada System Of Higher Education, On Behalf Of The University Of Nevada, Reno Apparatus, system, and method for cloud-assisted routing
US9383900B2 (en) 2012-09-12 2016-07-05 International Business Machines Corporation Enabling real-time operational environment conformity to an enterprise model
US9141637B2 (en) * 2012-09-26 2015-09-22 International Business Machines Corporation Predictive data management in a networked computing environment
US8924720B2 (en) 2012-09-27 2014-12-30 Intel Corporation Method and system to securely migrate and provision virtual machine images and content
US8850182B1 (en) 2012-09-28 2014-09-30 Shoretel, Inc. Data capture for secure protocols
US9301205B2 (en) 2012-10-04 2016-03-29 Benu Networks, Inc. Application and content awareness for self optimizing networks
CN104903799B (en) 2012-10-08 2018-05-22 费希尔-罗斯蒙特系统公司 Configurable user in Process Control System shows
US9424437B1 (en) 2012-10-12 2016-08-23 Egnyte, Inc. Systems and methods for providing file access in a hybrid cloud storage system
US9361192B2 (en) 2012-10-19 2016-06-07 Oracle International Corporation Method and apparatus for restoring an instance of a storage server
US9264478B2 (en) 2012-10-30 2016-02-16 Microsoft Technology Licensing, Llc Home cloud with virtualized input and output roaming over network
US9424228B2 (en) 2012-11-01 2016-08-23 Ezchip Technologies Ltd. High performance, scalable multi chip interconnect
US9442954B2 (en) 2012-11-12 2016-09-13 Datawise Systems Method and apparatus for achieving optimal resource allocation dynamically in a distributed computing environment
US20140140211A1 (en) 2012-11-16 2014-05-22 Cisco Technology, Inc. Classification of traffic for application aware policies in a wireless network
US9398436B2 (en) 2012-11-21 2016-07-19 Acer Incorporated Cloud service for making social connections
US9049115B2 (en) 2012-12-13 2015-06-02 Cisco Technology, Inc. Enabling virtual workloads using overlay technologies to interoperate with physical network services
US9268808B2 (en) 2012-12-31 2016-02-23 Facebook, Inc. Placement policy
US9122510B2 (en) 2013-01-02 2015-09-01 International Business Machines Corporation Querying and managing computing resources in a networked computing environment
CN105144652A (en) 2013-01-24 2015-12-09 惠普发展公司,有限责任合伙企业 Address resolution in software-defined networks
US20140215471A1 (en) 2013-01-28 2014-07-31 Hewlett-Packard Development Company, L.P. Creating a model relating to execution of a job on platforms
US9274818B2 (en) 2013-02-06 2016-03-01 International Business Machines Corporation Reliable and scalable image transfer for data centers with low connectivity using redundancy detection
US9525564B2 (en) 2013-02-26 2016-12-20 Zentera Systems, Inc. Secure virtual network platform for enterprise hybrid cloud computing environments
US9183016B2 (en) 2013-02-27 2015-11-10 Vmware, Inc. Adaptive task scheduling of Hadoop in a virtualized environment
US9251115B2 (en) 2013-03-07 2016-02-02 Citrix Systems, Inc. Dynamic configuration in cloud computing environments
US9043439B2 (en) 2013-03-14 2015-05-26 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US9244775B2 (en) 2013-03-14 2016-01-26 International Business Machines Corporation Reducing reading of database logs by persisting long-running transaction data
US9027087B2 (en) 2013-03-14 2015-05-05 Rackspace Us, Inc. Method and system for identity-based authentication of virtual machines
US20140280964A1 (en) 2013-03-15 2014-09-18 Gravitant, Inc. Systems, methods and computer readable mediums for implementing cloud service brokerage platform functionalities
US8954992B2 (en) 2013-03-15 2015-02-10 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Distributed and scaled-out network switch and packet processing
JP5983484B2 (en) 2013-03-21 2016-08-31 富士通株式会社 Information processing system, control program for controlling information processing apparatus, and control method for information processing system
WO2014165601A1 (en) 2013-04-02 2014-10-09 Orbis Technologies, Inc. Data center analytics and dashboard
US9438495B2 (en) 2013-04-02 2016-09-06 Amazon Technologies, Inc. Visualization of resources in a data center
US9973375B2 (en) 2013-04-22 2018-05-15 Cisco Technology, Inc. App store portal providing point-and-click deployment of third-party virtualized network functions
US9397929B2 (en) 2013-04-22 2016-07-19 Ciena Corporation Forwarding multicast packets over different layer-2 segments
US9407540B2 (en) 2013-09-06 2016-08-02 Cisco Technology, Inc. Distributed service chaining in a network environment
US20140366155A1 (en) 2013-06-11 2014-12-11 Cisco Technology, Inc. Method and system of providing storage services in multiple public clouds
US9621642B2 (en) 2013-06-17 2017-04-11 Telefonaktiebolaget Lm Ericsson (Publ) Methods of forwarding data packets using transient tables and related load balancers
US9632858B2 (en) 2013-07-28 2017-04-25 OpsClarity Inc. Organizing network performance metrics into historical anomaly dependency data
US9426060B2 (en) 2013-08-07 2016-08-23 International Business Machines Corporation Software defined network (SDN) switch clusters having layer-3 distributed router functionality
US9311140B2 (en) 2013-08-13 2016-04-12 Vmware, Inc. Method and apparatus for extending local area networks between clouds and migrating virtual machines using static network addresses
US9338223B2 (en) 2013-08-14 2016-05-10 Verizon Patent And Licensing Inc. Private cloud topology management system
US9043576B2 (en) 2013-08-21 2015-05-26 Simplivity Corporation System and method for virtual machine conversion
US9686154B2 (en) 2013-08-21 2017-06-20 International Business Machines Corporation Generating a service-catalog entry from discovered attributes of provisioned virtual machines
FR3011413A1 (en) * 2013-09-30 2015-04-03 Orange METHOD FOR ACCESSING A USER TO AT LEAST ONE COMMUNICATION SERVICE PROVIDED THROUGH A COMPUTER CENTER OF A CLOUD COMPUTING SYSTEM
US9268789B1 (en) * 2013-10-10 2016-02-23 Google Inc. System and methods for managing data location
US9304804B2 (en) 2013-10-14 2016-04-05 Vmware, Inc. Replicating virtual machines across different virtualization platforms
US20150106805A1 (en) 2013-10-15 2015-04-16 Cisco Technology, Inc. Accelerated instantiation of cloud resource
US9634944B2 (en) 2013-10-24 2017-04-25 Dell Products, Lp Multi-level iSCSI QoS for target differentiated data in DCB networks
US9787586B2 (en) 2013-10-24 2017-10-10 University Of Houston System Location-based network routing
KR20150070676A (en) 2013-12-17 2015-06-25 소프팅스 주식회사 Personal Home Cloud Computer System
US10915449B2 (en) 2013-12-19 2021-02-09 Hewlett Packard Enterprise Development Lp Prioritizing data requests based on quality of service
WO2015100656A1 (en) 2013-12-31 2015-07-09 华为技术有限公司 Method and device for implementing virtual machine communication
US9992103B2 (en) 2014-01-24 2018-06-05 Cisco Technology, Inc. Method for providing sticky load balancing
US9529657B2 (en) 2014-02-07 2016-12-27 Oracle International Corporation Techniques for generating diagnostic identifiers to trace events and identifying related diagnostic information
US9678731B2 (en) 2014-02-26 2017-06-13 Vmware, Inc. Methods and apparatus to generate a customized application blueprint
US20150249709A1 (en) 2014-02-28 2015-09-03 Vmware, Inc. Extending cloud storage with private devices
US9722945B2 (en) 2014-03-31 2017-08-01 Microsoft Technology Licensing, Llc Dynamically identifying target capacity when scaling cloud resources
US9591064B2 (en) 2014-03-31 2017-03-07 Verizon Patent And Licensing Inc. Method and apparatus for dynamic provisioning of communication services
US9755858B2 (en) 2014-04-15 2017-09-05 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US20150309908A1 (en) 2014-04-29 2015-10-29 Hewlett-Packard Development Company, L.P. Generating an interactive visualization of metrics collected for functional entities
US20150319063A1 (en) 2014-04-30 2015-11-05 Jive Communications, Inc. Dynamically associating a datacenter with a network device
US9473365B2 (en) 2014-05-08 2016-10-18 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US9483378B2 (en) 2014-05-21 2016-11-01 Dynatrace Llc Method and system for resource monitoring of large-scale, orchestrated, multi process job execution environments
US9582254B2 (en) 2014-05-22 2017-02-28 Oracle International Corporation Generating runtime components
US10375024B2 (en) 2014-06-20 2019-08-06 Zscaler, Inc. Cloud-based virtual private access systems and methods
US9613078B2 (en) 2014-06-26 2017-04-04 Amazon Technologies, Inc. Multi-database log with multi-item transaction support
US10341458B2 (en) * 2014-06-30 2019-07-02 EMC IP Holding Company LLC Predicting a sub-set of resources to be migrated to a new location based on a mobile device's interactions with resources at a first location and a predicted period of time the mobile device is to be in the new location
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US20160013990A1 (en) 2014-07-09 2016-01-14 Cisco Technology, Inc. Network traffic management using heat maps with actual and planned /estimated metrics
GB2529669B8 (en) * 2014-08-28 2017-03-15 Ibm Storage system
CN105446793B (en) 2014-08-28 2018-08-28 国际商业机器公司 The method and apparatus for migrating fictitious assets
US9825878B2 (en) 2014-09-26 2017-11-21 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US9634928B2 (en) 2014-09-29 2017-04-25 Juniper Networks, Inc. Mesh network of simple nodes with centralized control
US10135737B2 (en) 2014-09-30 2018-11-20 Nicira, Inc. Distributed load balancing systems
US20160099847A1 (en) 2014-10-02 2016-04-07 Cisco Technology, Inc. Method for non-disruptive cloud infrastructure software component deployment
US10757170B2 (en) 2014-10-13 2020-08-25 Vmware, Inc. Cross-cloud namespace management for multi-tenant environments
US9558078B2 (en) 2014-10-28 2017-01-31 Microsoft Technology Licensing, Llc Point in time database restore from storage snapshots
CN104320342B (en) 2014-10-29 2017-10-27 新华三技术有限公司 Message forwarding method and device in a kind of transparent interconnection of lots of links internet
US9871745B2 (en) 2014-11-12 2018-01-16 International Business Machines Corporation Automatic scaling of at least one user application to external clouds
US9602544B2 (en) 2014-12-05 2017-03-21 Viasat, Inc. Methods and apparatus for providing a secure overlay network between clouds
US9747249B2 (en) 2014-12-29 2017-08-29 Nicira, Inc. Methods and systems to achieve multi-tenancy in RDMA over converged Ethernet
US9075649B1 (en) 2015-01-26 2015-07-07 Storagecraft Technology Corporation Exposing a proprietary image backup to a hypervisor as a disk file that is bootable by the hypervisor
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
WO2016134182A1 (en) 2015-02-18 2016-08-25 Unravel Data Systems, Inc. System and method for analyzing big data activities
US9338595B1 (en) * 2015-02-23 2016-05-10 International Business Machines Corporation Location-based mobile object management in a distributed cloud for enhancing access and performance
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US9928377B2 (en) 2015-03-19 2018-03-27 Netskope, Inc. Systems and methods of monitoring and controlling enterprise information stored on a cloud computing service (CCS)
US9432294B1 (en) 2015-03-21 2016-08-30 Cisco Technology, Inc. Utilizing user-specified access control lists in conjunction with redirection and load-balancing on a port
US9444744B1 (en) 2015-04-04 2016-09-13 Cisco Technology, Inc. Line-rate selective load balancing of permitted network traffic
US20170024260A1 (en) 2015-07-21 2017-01-26 Cisco Technology, Inc. Workload migration across cloud providers and data centers
US20170026470A1 (en) 2015-07-22 2017-01-26 Cisco Technology, Inc. Intercloud audience and content analytics
US9667657B2 (en) 2015-08-04 2017-05-30 AO Kaspersky Lab System and method of utilizing a dedicated computer security service
US20170048308A1 (en) * 2015-08-13 2017-02-16 Saad Bin Qaisar System and Apparatus for Network Conscious Edge to Cloud Sensing, Analytics, Actuation and Virtualization
US9781209B2 (en) 2015-08-20 2017-10-03 Intel Corporation Techniques for routing packets between virtual machines
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US11005682B2 (en) 2015-10-06 2021-05-11 Cisco Technology, Inc. Policy-driven switch overlay bypass in a hybrid cloud network environment
US10455054B2 (en) * 2015-10-09 2019-10-22 At&T Intellectual Property I, L.P. Cross-services application service, device and network content delivery management
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US10142293B2 (en) 2015-12-15 2018-11-27 International Business Machines Corporation Dynamically defined virtual private network tunnels in hybrid cloud environments
CN105740084B (en) 2016-01-27 2018-08-24 北京航空航天大学 Consider the cloud computing system Reliability Modeling of common cause fault
US10581982B2 (en) * 2016-04-08 2020-03-03 Facebook, Inc. Mobility of application services in a distributed computing system
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10531318B1 (en) * 2018-11-28 2020-01-07 International Business Machines Corporation Mobile data scheduling based on signal strength and user availability

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101636967A (en) * 2007-03-22 2010-01-27 微软公司 The remote data access techniques that is used for portable set
US20120214506A1 (en) * 2011-02-22 2012-08-23 Ole-Petter Skaaksrud Systems and methods for geo-staging of sensor data through distributed global (cloud) architecture
US20130073670A1 (en) * 2011-09-15 2013-03-21 Microsoft Corporation Geo-Migration Of User State
WO2013039930A2 (en) * 2011-09-15 2013-03-21 Microsoft Corporation Geo-migration of user state
US20130144978A1 (en) * 2011-12-02 2013-06-06 International Business Machines Corporation Data relocation in global storage cloud environments
CN103297492A (en) * 2012-02-07 2013-09-11 国际商业机器公司 Migrating data between networked computing environments
US20160132784A1 (en) * 2012-02-21 2016-05-12 Comcast Cable Communications, Llc Moveable storage
CN105164990A (en) * 2013-03-18 2015-12-16 皇家Kpn公司 Redirecting client device from first gateway to second gateway for accessing network node function
US20150373108A1 (en) * 2014-06-18 2015-12-24 International Business Machines Corporation Dynamic proximity based networked storage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
秦华等: "基于OpenFlow网络的数据中心服务器负载均衡策略", 《计算机工程》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114207570A (en) * 2019-08-07 2022-03-18 国际商业机器公司 Techniques for identifying segments of an information space by active adaptation to an environmental context
CN114270322A (en) * 2019-08-28 2022-04-01 国际商业机器公司 Data relocation management in data center networks
US11748206B2 (en) 2019-08-28 2023-09-05 International Business Machines Corporation Data recovery modification based on performance data exhibited by a network of data centers and data recovery requirement
CN110929317A (en) * 2019-10-17 2020-03-27 广联达科技股份有限公司 Method, system and computer readable storage medium for automatically complementing user component modeling information
CN113614692A (en) * 2020-02-19 2021-11-05 茨特里克斯系统公司 Migration of desktop workloads
CN111935784A (en) * 2020-08-12 2020-11-13 重庆邮电大学 Content caching method based on federal learning in fog computing network
CN111935784B (en) * 2020-08-12 2022-04-22 重庆邮电大学 Content caching method based on federal learning in fog computing network
CN114296405A (en) * 2020-09-22 2022-04-08 罗克韦尔自动化技术公司 Implementation of serverless functionality using container orchestration systems and operating technology devices
CN114296405B (en) * 2020-09-22 2023-12-26 罗克韦尔自动化技术公司 Achieving server-less functionality using container orchestration systems and operating technology devices
CN115866047A (en) * 2023-01-31 2023-03-28 华控清交信息科技(北京)有限公司 Data redirection method and device in multi-party security computing and electronic equipment

Also Published As

Publication number Publication date
WO2018071086A1 (en) 2018-04-19
EP3523733A1 (en) 2019-08-14
CN109844728B (en) 2023-09-15
US10523592B2 (en) 2019-12-31
US11716288B2 (en) 2023-08-01
US20200145348A1 (en) 2020-05-07
US20180102985A1 (en) 2018-04-12
US20230379269A1 (en) 2023-11-23

Similar Documents

Publication Publication Date Title
CN109844728A (en) Arranging system based on user information migrated users data and service
US11689884B2 (en) System and method for providing data services on vehicles
US11443626B2 (en) Adjusting vehicle timing in a transportation network
US10117055B2 (en) System and method for providing data services on vehicles
US10332039B2 (en) Intelligent travel planning
CN105468442B (en) methods, systems, and media for migrating resources across clouds
US20180276572A1 (en) Providing travel related content for transportation by multiple vehicles
CN107211341A (en) The system, apparatus and method that distributed content is prefetched are carried out to user equipment
US10785297B2 (en) Intelligent dataset migration and delivery to mobile internet of things devices using fifth-generation networks
US20180121878A1 (en) Intelligent package delivery
US10540388B1 (en) Location-aware intelligent data migration and delivery
US20200175610A1 (en) Cognitive collaboration
US20180276578A1 (en) Providing travel related content to modify travel itineraries
Yarkoni et al. Quantum shuttle: traffic navigation with quantum computing
US20180276573A1 (en) Providing travel related content customized for users
AU2016202134B2 (en) System and method for providing data services on vehicles
US20210407031A1 (en) Utilizing digital signals to intelligently monitor client device transit progress and generate dynamic public transit interfaces
US11075817B1 (en) Context aware network capacity augmentation using a flying device
US20180276571A1 (en) Providing travel related content by predicting travel intent
US20200245141A1 (en) Privacy protection of entities in a transportation system
US20220383435A1 (en) Systems and methods for modular hotel and living space orchestration
WO2020165886A1 (en) Intelligent travel planning system to maximize travel experience by managing constraints and optimizing redundancy
Sharma et al. Iot enabled smart tourism (iotest): Tourism service dimensions
US20230140057A1 (en) Conversational user experience for multimodal travel system
US20230258460A1 (en) Creating a time bounded and goal driven network for passenger guidance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant